<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Landon+Mayo</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Landon+Mayo"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Landon_Mayo"/>
		<updated>2026-05-06T21:47:39Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=253125</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=253125"/>
				<updated>2019-07-19T00:49:19Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo&lt;br /&gt;
| trainer_email1 = landon.mayo@rapidredteam.com&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Application Pentesting&lt;br /&gt;
&lt;br /&gt;
Secure Development Training&lt;br /&gt;
&lt;br /&gt;
Security Research and Development&lt;br /&gt;
&lt;br /&gt;
Integrating Security in the SDLC&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=233570</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=233570"/>
				<updated>2017-09-20T20:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: Changed Upcoming event from October to November&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:joseph.konieczka@owasp.org Joseph Konieczka], [mailto:landon.mayo@owasp.org Landon Mayo], [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], [mailto:t.borland@owasp.org Tyler Borland], [mailto:tom.cline@owasp.org Tom Cline], [mailto:johnathan.kuskos@owasp.org Johnathan Kuskos]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
OWASP Houston November Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
Tuesday November 20, 2017&lt;br /&gt;
&lt;br /&gt;
Title: Lessons from the Underground:  Identity Theft and Financial Fraud&lt;br /&gt;
&lt;br /&gt;
Please join us for another OWASP Houston workshop. &lt;br /&gt;
&lt;br /&gt;
Landon Mayo will be leading a lesson on the world of the dark web. He has spent two years researching tactics used to conduct credit card fraud and identity theft.&lt;br /&gt;
&lt;br /&gt;
This lesson is designed to educate you on ways to spot the early signs of potential identity theft and financial fraud. &lt;br /&gt;
&lt;br /&gt;
Landon has been in the trenches researching the tactics used by criminals and criminal organizations.  &lt;br /&gt;
&lt;br /&gt;
Location: TBD&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
OWASP Houston July Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
Tuesday July 18, 2017 at 6:30PM&lt;br /&gt;
&lt;br /&gt;
Title: Making Vulnerability Management Less Painful with OWASP DefectDojo&lt;br /&gt;
&lt;br /&gt;
DefectDojo was created in 2013 when one security engineer at Rackspace stupidly opened his mouth in front of his leadership team. Vulnerability management is traditionally tedious, time consuming, and mentally draining. DefectDojo attempts to streamline vulnerability management with automation centered around templating, report generation, metrics, scanner consolidation, and baseline self-service tools. DefectDojo is currently used by multiple large enterprises and has core contributors from five different companies. It has made several engineers' lives much easier, and it can help you too. Got a ton of findings to consolidate and report on? DefectDojo has you covered. Need to have a dashboard of your team’s work? DefectDojo has you covered. Tired of boilerplate report generation? DefectDojo does that for you. Come check out how to make vulnerability management less painful and speed up your appsec program in this talk with demo.&lt;br /&gt;
&lt;br /&gt;
Speaker:&lt;br /&gt;
&lt;br /&gt;
Greg Anderson is the project leader for OWASP DefectDojo. He will be presenting remotely and the room works well for this format. Greg is a long time member of OWASP and has held several different leadership positions. You can find his bio on the official OWASP users page: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/User:Devgreg&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
&lt;br /&gt;
NetIQ Corp&lt;br /&gt;
&lt;br /&gt;
515 Post Oak Blvd, Houston, TX 77027&lt;br /&gt;
&lt;br /&gt;
OWASP Houston May Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
=====Tuesday May 23, 2017 at 6:00PM=====&lt;br /&gt;
Discussion about OWASP Projects and events &lt;br /&gt;
&lt;br /&gt;
'''OWASP Houston Chapter assisted San Jacinto College Advisory Boards'''&lt;br /&gt;
&lt;br /&gt;
'''March 30 and 31, 2017'''&lt;br /&gt;
&lt;br /&gt;
We had some members of the chapter provide extremely valuable feedback to enhance the college's programs. Thank you to everyone that helped with this effort. We will have more opportunities to be involved with the college.&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Chapter Meeting=====&lt;br /&gt;
===== Wednesday February 22, 2017 at 6:00PM=====&lt;br /&gt;
&lt;br /&gt;
Title: Effective Application Security Testing at High Velocity: Keeping up with Agile and DevOps&lt;br /&gt;
Speaker: James &amp;quot;Jimmy&amp;quot; Rabon&lt;br /&gt;
James Rabon shared lessons learned by working with some of the most advanced and innovative application security customers / programs. Learn how static and dynamic analysis of applications can be made efficient and effective in some of the most dynamic development organizations. See how app sec leaders integrate application security throughout their software development lifecycle and include it in the DevOps tool chain of automation to move security testing at high velocity. Automation is your friend and we will examine where modern security tools are being included in the “treat infrastructure as code” mantra. We’ll also take a look beyond security tools and automation to the people and processes that effective application security programs use to run at high speed. A brief demo will follow for those interested.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Jimmy Rabon began his career as a software developer for the Computer Sciences Corp before deciding to specialize in application security over seven years ago with Fortify.&lt;br /&gt;
He began his career in application security by serving as an on-site subject matter expert for software security and has performed countless security audits of applications (both static and dynamic testing reviews) for several large commercial and government entities. He has enabled organizations that utilized his or his team’s services, to find and fix exploitable vulnerabilities in critical systems.&lt;br /&gt;
&lt;br /&gt;
Having worked as a software engineer for many years prior to specializing in application security, he understands the unique challenges that developers face when attempting to deliver secure code and can help deliver effective technology and processes to enable information assurance and development teams to work together to make software as secure as possible.&lt;br /&gt;
&lt;br /&gt;
He leads a team of highly skilled application security consultants as the head of HPE Fortify professional services responsible for designing effective software assurance &lt;br /&gt;
solutions in the Americas.&lt;br /&gt;
&lt;br /&gt;
He is currently a Senior Product Manager with Fortify with a passion for building security products that solve real world problems in the most effective and efficient way possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Chapter Meeting=====&lt;br /&gt;
=====Monday October 17, 2016 at 6:30PM=====&lt;br /&gt;
&lt;br /&gt;
Title: Murder Mystery – Who is Killing your Information Security Program&lt;br /&gt;
&lt;br /&gt;
Speaker: Gordon MacKay&lt;br /&gt;
&lt;br /&gt;
Presentation Abstract:&lt;br /&gt;
&lt;br /&gt;
Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results in heinous consequences, thereby killing your InfoSec program.  This session shares clues on this challenge, step by step, in the form of a murder mystery game, and ultimately reveals the culprit as well as strategies to overcome it.  Come participate, play, and interact! Try to guess “who-dunnit,” and learn how to avoid future similar InfoSec crimes.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio&lt;br /&gt;
&lt;br /&gt;
Gordon MacKay, CISSP and Software/Systems Guru with a dash of security hacking,serves as CTO for Digital Defense, Inc. He applies mathematical modeling and engineering principles in investigating solutions to many of the challenges within the information security space. His solution to matching network discovered hosts within independent vulnerability assessments across time resulted in achieving patent-pending status for the company’s scanning technology. MacKay has presented at numerous security related conferences, including Bsides Austin 2016, BSides San Antonio 2016, BSides Dallas 2015, RSA 2013, ISC2 San Antonio, ISSA Houston, ISACA San Antonio, and has been featured by top media outlets such as CIO Review, FOX Business, Fox News, Softpedia, IT World Canada and others. He holds a Bachelor's in Computer Engineering from McGill University. He is a Distinguished Ponemon Institute Fellow.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston September Chapter Meeting=====&lt;br /&gt;
=====Monday September 19, 2016 at 6:30PM=====&lt;br /&gt;
Title:  Web App Testing Stats Compared to The OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
Description:&lt;br /&gt;
For over seven years, Cigital has performed high volumes of application security assessments through the Cigital Assessment Center (CAC). Over that time the CAC has accumulated a large amount of data that provides helpful insights into software security practices. We’ll present the most common web application security vulnerabilities identified over one year by the CAC, contrasting our findings with one of the industry’s leading benchmarks, the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Joel Scambray is a Principal at Cigital, a leading software security consulting firm established in 1992. He has helped Fortune 500-class organizations address information security challenges for over twenty years as a consultant, author and speaker, business leader, and entrepreneur. He is widely recognized as co-author of the Hacking Exposed book series, and has worked/consulted for companies including Microsoft, Foundstone, Amazon, Costco, Softcard, and Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Chapter Meeting=====&lt;br /&gt;
=====Monday August 22, 2016 at 6:30PM=====&lt;br /&gt;
August speaker and topic - Roger Huebner, Corporate Architect/Distinguished Engineer at NetIQ, will be speaking on Docker and containers. Since so many developers are adopting this approach to deployment and operations teams are also embracing this growing trend, it is important to learn about it so that we can help secure these application containers as well. We had some lively discussion on this topic, so it was definitely well received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston July 2016 Chapter Meeting=====&lt;br /&gt;
=====Monday July 18, 2016 at 6:30PM=====&lt;br /&gt;
&lt;br /&gt;
Michael F. Angelo, CRISC, CISSP | Chief Security Architect at Micro Focus | NetIQ Corporation went over Threat Modeling basics and philosophy as well of some of the tools that he uses. We had a solid turnout and a great deal of audience participation and discussion.&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston June 2016 Chapter Meeting=====&lt;br /&gt;
=====Monday June 20, 2016 at 6:30PM=====&lt;br /&gt;
&lt;br /&gt;
We met at the NetIQ offices from 6:30-8:30PM on Monday June 20, 2016 to restart the chapter and had a great turnout.&lt;br /&gt;
&lt;br /&gt;
Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
1. Introductions of all attendees to gain a solid understanding of backgrounds, interests, and what people would like to learn about.&lt;br /&gt;
&lt;br /&gt;
2. Upcoming security related conferences - LASCON in Austin, Cyber Texas in San Antonio&lt;br /&gt;
&lt;br /&gt;
3. Major OWASP Projects that have been updated recently or currently being worked on: OWASP Top 10 - 2016 Data Call discussion question review. Proactive Controls, ASVS 3, Developer Guide reboot, OpenSAMM, WAFEC updates, OWASP Testing Guide, WebGoat 7&lt;br /&gt;
&lt;br /&gt;
4. Discussion about possible study groups that we want to start having. For example, CISSP or CSSLP certification preparation, Hacking-Live CD interactive sessions. OWASP ZAP workshop (leveraging bodgeit, WebGoat, and Security Shepherd), other books or projects people would like to pursue.&lt;br /&gt;
&lt;br /&gt;
5. Topics that people would like to see discussed at the next meeting and how often they would like to meet. Ideally, we could meet once a month for the normal meeting and then at least twice a month for study groups. This has been very successful for the Austin chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://alertlogic.com Alert Logic - Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www8.hp.com/us/en/software-solutions/application-security/index.html Hewlett Packard Enterprise - Enabling organizations to take a proactive approach to today’s most advanced threats through application and data security solutions and security analytics.]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas - Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border - Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please RSVP on our chapter meetup page: https://www.meetup.com/OWASP-Houston/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We are currently mapping out workshops for 2017. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
We normally have one or two speakers at each formal presentation meeting. Sometimes the presenter is from out of state, so we try to defer some of their travel expenses. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest.&lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org and Joseph dot Konieczka at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=233569</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=233569"/>
				<updated>2017-09-20T19:52:21Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: November OWASP Event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:joseph.konieczka@owasp.org Joseph Konieczka], [mailto:landon.mayo@owasp.org Landon Mayo], [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], [mailto:t.borland@owasp.org Tyler Borland], [mailto:tom.cline@owasp.org Tom Cline], [mailto:johnathan.kuskos@owasp.org Johnathan Kuskos]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
OWASP Houston October Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
Tuesday November 20, 2017&lt;br /&gt;
&lt;br /&gt;
Title: Lessons from the Underground:  Identity Theft and Financial Fraud&lt;br /&gt;
&lt;br /&gt;
Please join us for another OWASP Houston workshop. &lt;br /&gt;
&lt;br /&gt;
Landon Mayo will be leading a lesson on the world of the dark web. He has spent two years researching tactics used to conduct credit card fraud and identity theft.&lt;br /&gt;
&lt;br /&gt;
This lesson is designed to educate you on ways to spot the early signs of potential identity theft and financial fraud. &lt;br /&gt;
&lt;br /&gt;
Landon has been in the trenches researching the tactics used by criminals and criminal organizations.  &lt;br /&gt;
&lt;br /&gt;
Location: TBD&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
OWASP Houston July Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
Tuesday July 18, 2017 at 6:30PM&lt;br /&gt;
&lt;br /&gt;
Title: Making Vulnerability Management Less Painful with OWASP DefectDojo&lt;br /&gt;
&lt;br /&gt;
DefectDojo was created in 2013 when one security engineer at Rackspace stupidly opened his mouth in front of his leadership team. Vulnerability management is traditionally tedious, time consuming, and mentally draining. DefectDojo attempts to streamline vulnerability management with automation centered around templating, report generation, metrics, scanner consolidation, and baseline self-service tools. DefectDojo is currently used by multiple large enterprises and has core contributors from five different companies. It has made several engineers' lives much easier, and it can help you too. Got a ton of findings to consolidate and report on? DefectDojo has you covered. Need to have a dashboard of your team’s work? DefectDojo has you covered. Tired of boilerplate report generation? DefectDojo does that for you. Come check out how to make vulnerability management less painful and speed up your appsec program in this talk with demo.&lt;br /&gt;
&lt;br /&gt;
Speaker:&lt;br /&gt;
&lt;br /&gt;
Greg Anderson is the project leader for OWASP DefectDojo. He will be presenting remotely and the room works well for this format. Greg is a long time member of OWASP and has held several different leadership positions. You can find his bio on the official OWASP users page: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/User:Devgreg&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
&lt;br /&gt;
NetIQ Corp&lt;br /&gt;
&lt;br /&gt;
515 Post Oak Blvd, Houston, TX 77027&lt;br /&gt;
&lt;br /&gt;
OWASP Houston May Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
=====Tuesday May 23, 2017 at 6:00PM=====&lt;br /&gt;
Discussion about OWASP Projects and events &lt;br /&gt;
&lt;br /&gt;
'''OWASP Houston Chapter assisted San Jacinto College Advisory Boards'''&lt;br /&gt;
&lt;br /&gt;
'''March 30 and 31, 2017'''&lt;br /&gt;
&lt;br /&gt;
We had some members of the chapter provide extremely valuable feedback to enhance the college's programs. Thank you to everyone that helped with this effort. We will have more opportunities to be involved with the college.&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Chapter Meeting=====&lt;br /&gt;
===== Wednesday February 22, 2017 at 6:00PM=====&lt;br /&gt;
&lt;br /&gt;
Title: Effective Application Security Testing at High Velocity: Keeping up with Agile and DevOps&lt;br /&gt;
Speaker: James &amp;quot;Jimmy&amp;quot; Rabon&lt;br /&gt;
James Rabon shared lessons learned by working with some of the most advanced and innovative application security customers / programs. Learn how static and dynamic analysis of applications can be made efficient and effective in some of the most dynamic development organizations. See how app sec leaders integrate application security throughout their software development lifecycle and include it in the DevOps tool chain of automation to move security testing at high velocity. Automation is your friend and we will examine where modern security tools are being included in the “treat infrastructure as code” mantra. We’ll also take a look beyond security tools and automation to the people and processes that effective application security programs use to run at high speed. A brief demo will follow for those interested.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Jimmy Rabon began his career as a software developer for the Computer Sciences Corp before deciding to specialize in application security over seven years ago with Fortify.&lt;br /&gt;
He began his career in application security by serving as an on-site subject matter expert for software security and has performed countless security audits of applications (both static and dynamic testing reviews) for several large commercial and government entities. He has enabled organizations that utilized his or his team’s services, to find and fix exploitable vulnerabilities in critical systems.&lt;br /&gt;
&lt;br /&gt;
Having worked as a software engineer for many years prior to specializing in application security, he understands the unique challenges that developers face when attempting to deliver secure code and can help deliver effective technology and processes to enable information assurance and development teams to work together to make software as secure as possible.&lt;br /&gt;
&lt;br /&gt;
He leads a team of highly skilled application security consultants as the head of HPE Fortify professional services responsible for designing effective software assurance &lt;br /&gt;
solutions in the Americas.&lt;br /&gt;
&lt;br /&gt;
He is currently a Senior Product Manager with Fortify with a passion for building security products that solve real world problems in the most effective and efficient way possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Chapter Meeting=====&lt;br /&gt;
=====Monday October 17, 2016 at 6:30PM=====&lt;br /&gt;
&lt;br /&gt;
Title: Murder Mystery – Who is Killing your Information Security Program&lt;br /&gt;
&lt;br /&gt;
Speaker: Gordon MacKay&lt;br /&gt;
&lt;br /&gt;
Presentation Abstract:&lt;br /&gt;
&lt;br /&gt;
Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results in heinous consequences, thereby killing your InfoSec program.  This session shares clues on this challenge, step by step, in the form of a murder mystery game, and ultimately reveals the culprit as well as strategies to overcome it.  Come participate, play, and interact! Try to guess “who-dunnit,” and learn how to avoid future similar InfoSec crimes.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio&lt;br /&gt;
&lt;br /&gt;
Gordon MacKay, CISSP and Software/Systems Guru with a dash of security hacking,serves as CTO for Digital Defense, Inc. He applies mathematical modeling and engineering principles in investigating solutions to many of the challenges within the information security space. His solution to matching network discovered hosts within independent vulnerability assessments across time resulted in achieving patent-pending status for the company’s scanning technology. MacKay has presented at numerous security related conferences, including Bsides Austin 2016, BSides San Antonio 2016, BSides Dallas 2015, RSA 2013, ISC2 San Antonio, ISSA Houston, ISACA San Antonio, and has been featured by top media outlets such as CIO Review, FOX Business, Fox News, Softpedia, IT World Canada and others. He holds a Bachelor's in Computer Engineering from McGill University. He is a Distinguished Ponemon Institute Fellow.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston September Chapter Meeting=====&lt;br /&gt;
=====Monday September 19, 2016 at 6:30PM=====&lt;br /&gt;
Title:  Web App Testing Stats Compared to The OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
Description:&lt;br /&gt;
For over seven years, Cigital has performed high volumes of application security assessments through the Cigital Assessment Center (CAC). Over that time the CAC has accumulated a large amount of data that provides helpful insights into software security practices. We’ll present the most common web application security vulnerabilities identified over one year by the CAC, contrasting our findings with one of the industry’s leading benchmarks, the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
Joel Scambray is a Principal at Cigital, a leading software security consulting firm established in 1992. He has helped Fortune 500-class organizations address information security challenges for over twenty years as a consultant, author and speaker, business leader, and entrepreneur. He is widely recognized as co-author of the Hacking Exposed book series, and has worked/consulted for companies including Microsoft, Foundstone, Amazon, Costco, Softcard, and Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Chapter Meeting=====&lt;br /&gt;
=====Monday August 22, 2016 at 6:30PM=====&lt;br /&gt;
August speaker and topic - Roger Huebner, Corporate Architect/Distinguished Engineer at NetIQ, will be speaking on Docker and containers. Since so many developers are adopting this approach to deployment and operations teams are also embracing this growing trend, it is important to learn about it so that we can help secure these application containers as well. We had some lively discussion on this topic, so it was definitely well received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston July 2016 Chapter Meeting=====&lt;br /&gt;
=====Monday July 18, 2016 at 6:30PM=====&lt;br /&gt;
&lt;br /&gt;
Michael F. Angelo, CRISC, CISSP | Chief Security Architect at Micro Focus | NetIQ Corporation went over Threat Modeling basics and philosophy as well of some of the tools that he uses. We had a solid turnout and a great deal of audience participation and discussion.&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston June 2016 Chapter Meeting=====&lt;br /&gt;
=====Monday June 20, 2016 at 6:30PM=====&lt;br /&gt;
&lt;br /&gt;
We met at the NetIQ offices from 6:30-8:30PM on Monday June 20, 2016 to restart the chapter and had a great turnout.&lt;br /&gt;
&lt;br /&gt;
Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
1. Introductions of all attendees to gain a solid understanding of backgrounds, interests, and what people would like to learn about.&lt;br /&gt;
&lt;br /&gt;
2. Upcoming security related conferences - LASCON in Austin, Cyber Texas in San Antonio&lt;br /&gt;
&lt;br /&gt;
3. Major OWASP Projects that have been updated recently or currently being worked on: OWASP Top 10 - 2016 Data Call discussion question review. Proactive Controls, ASVS 3, Developer Guide reboot, OpenSAMM, WAFEC updates, OWASP Testing Guide, WebGoat 7&lt;br /&gt;
&lt;br /&gt;
4. Discussion about possible study groups that we want to start having. For example, CISSP or CSSLP certification preparation, Hacking-Live CD interactive sessions. OWASP ZAP workshop (leveraging bodgeit, WebGoat, and Security Shepherd), other books or projects people would like to pursue.&lt;br /&gt;
&lt;br /&gt;
5. Topics that people would like to see discussed at the next meeting and how often they would like to meet. Ideally, we could meet once a month for the normal meeting and then at least twice a month for study groups. This has been very successful for the Austin chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://alertlogic.com Alert Logic - Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www8.hp.com/us/en/software-solutions/application-security/index.html Hewlett Packard Enterprise - Enabling organizations to take a proactive approach to today’s most advanced threats through application and data security solutions and security analytics.]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas - Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border - Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please RSVP on our chapter meetup page: https://www.meetup.com/OWASP-Houston/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We are currently mapping out workshops for 2017. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
We normally have one or two speakers at each formal presentation meeting. Sometimes the presenter is from out of state, so we try to defer some of their travel expenses. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest.&lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org and Joseph dot Konieczka at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=208098</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=208098"/>
				<updated>2016-02-04T09:25:57Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo, Chapter Leader&lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Application Pentesting&lt;br /&gt;
&lt;br /&gt;
Secure Development Training&lt;br /&gt;
&lt;br /&gt;
Security Research and Development&lt;br /&gt;
&lt;br /&gt;
Integrating Security in the SDLC&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=205741</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=205741"/>
				<updated>2016-01-02T20:20:37Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:landon.mayo@owasp.org Landon Mayo], [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], [mailto:t.borland@owasp.org Tyler Borland], [mailto:tom.cline@owasp.org Tom Cline], [mailto:johnathan.kuskos@owasp.org Johnathan Kuskos]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
====To Be Announced====&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston Metasploit Workshop=====&lt;br /&gt;
=====February 20th 2014 at 6PM=====&lt;br /&gt;
Greetings,&lt;br /&gt;
&lt;br /&gt;
We have a new venue sponsored by TXRX Labs. If you haven't been to TXRX labs its 16,000-square-foot hacker space on the east side of downtown. They provide educational classes like Intro to LinuxCNC and host recreational programming events. They also have classes on knitting, welding,  soldering, bike repair, and pancakes. This is a great space for learning in Houston and that's why we're exploring its use for OWASP workshops. &lt;br /&gt;
&lt;br /&gt;
Our first Workshop topic for 2014 will be an introduction to Metasploit led by Dennis Maldonado(@DennisMald).&lt;br /&gt;
&lt;br /&gt;
Dennis is a security enthusiast/researcher with an interest in web application security and how web application vulnerabilities can be used to gain a foothold into the network.&lt;br /&gt;
&lt;br /&gt;
Dennis will be hosting a workshop on Metasploit and how it can be utilized for web application security assessments. &lt;br /&gt;
If you haven't been to an OWASP Houston Workshop before, you are encouraged to bring a laptop to follow along with the presentation, ask questions, and test out concepts.&lt;br /&gt;
&lt;br /&gt;
Reception 6PM-7PM&lt;br /&gt;
&lt;br /&gt;
Presentation 7PM-8PM&lt;br /&gt;
&lt;br /&gt;
Questions/Audience Participation 8PM-9PM &lt;br /&gt;
We will update this event to include more details as we confirm them.&lt;br /&gt;
&lt;br /&gt;
TXRX Labs&lt;br /&gt;
205 Roberts St, Houston, TX &lt;br /&gt;
&lt;br /&gt;
www.txrxlabs.org&lt;br /&gt;
&lt;br /&gt;
RSVP at http://www.meetup.com/OWASP-Houston/events/163900402/&lt;br /&gt;
&lt;br /&gt;
Thank you,&lt;br /&gt;
&lt;br /&gt;
OWASP Houston &lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15, 2013 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19, 2013 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=205740</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=205740"/>
				<updated>2016-01-02T20:15:07Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: updated chapter leader contact info for Landon Mayo; moved 2 year old upcoming event to past events; upcoming events are TBA (will contact other leaders)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:landon.mayo@owasp.org Landon Mayo,] [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], [mailto:t.borland@owasp.org Tyler Borland], [mailto:tom.cline@owasp.org Tom Cline], [mailto:johnathan.kuskos@owasp.org Johnathan Kuskos]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
====TBA====&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston Metasploit Workshop=====&lt;br /&gt;
=====February 20th 2014 at 6PM=====&lt;br /&gt;
Greetings,&lt;br /&gt;
&lt;br /&gt;
We have a new venue sponsored by TXRX Labs. If you haven't been to TXRX labs its 16,000-square-foot hacker space on the east side of downtown. They provide educational classes like Intro to LinuxCNC and host recreational programming events. They also have classes on knitting, welding,  soldering, bike repair, and pancakes. This is a great space for learning in Houston and that's why we're exploring its use for OWASP workshops. &lt;br /&gt;
&lt;br /&gt;
Our first Workshop topic for 2014 will be an introduction to Metasploit led by Dennis Maldonado(@DennisMald).&lt;br /&gt;
&lt;br /&gt;
Dennis is a security enthusiast/researcher with an interest in web application security and how web application vulnerabilities can be used to gain a foothold into the network.&lt;br /&gt;
&lt;br /&gt;
Dennis will be hosting a workshop on Metasploit and how it can be utilized for web application security assessments. &lt;br /&gt;
If you haven't been to an OWASP Houston Workshop before, you are encouraged to bring a laptop to follow along with the presentation, ask questions, and test out concepts.&lt;br /&gt;
&lt;br /&gt;
Reception 6PM-7PM&lt;br /&gt;
&lt;br /&gt;
Presentation 7PM-8PM&lt;br /&gt;
&lt;br /&gt;
Questions/Audience Participation 8PM-9PM &lt;br /&gt;
We will update this event to include more details as we confirm them.&lt;br /&gt;
&lt;br /&gt;
TXRX Labs&lt;br /&gt;
205 Roberts St, Houston, TX &lt;br /&gt;
&lt;br /&gt;
www.txrxlabs.org&lt;br /&gt;
&lt;br /&gt;
RSVP at http://www.meetup.com/OWASP-Houston/events/163900402/&lt;br /&gt;
&lt;br /&gt;
Thank you,&lt;br /&gt;
&lt;br /&gt;
OWASP Houston &lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15, 2013 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19, 2013 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=204192</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=204192"/>
				<updated>2015-12-01T13:21:45Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Application Pentesting&lt;br /&gt;
&lt;br /&gt;
Secure Development Training&lt;br /&gt;
&lt;br /&gt;
Security Research and Development&lt;br /&gt;
&lt;br /&gt;
Integrating Security in the SDLC&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)&amp;diff=194827</id>
		<title>Test Upload of Malicious Files (OTG-BUSLOGIC-009)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)&amp;diff=194827"/>
				<updated>2015-05-14T11:12:56Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
Many application’s business processes allow for the upload of data/information. We regularly check the validity and security of text but accepting files can introduce even more risk. To reduce the risk we may only accept certain file extensions, but attackers are able to encapsulate malicious code into inert file types. Testing for malicious files verifies that the application/system is able to correctly protect against attackers uploading malicious files.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerabilities related to the uploading of malicious files is unique in that these “malicious” files can easily be rejected through including business logic that will scan files during the upload process and reject those perceived as malicious. Additionally, this is different from uploading unexpected files in that while the file type may be accepted the file may still be malicious to the system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Finally, &amp;quot;malicious&amp;quot; means different things to different systems, for example Malicious files that may exploit SQL server vulnerabilities may not be considered a &amp;quot;malicious&amp;quot; to a main frame flat file environment.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The application may allow the upload of malicious files that include exploits or shellcode without submitting them to malicious file scanning. Malicious files could be detected and stopped at various points of the application architecture such as: IPS/IDS, application server anti-virus software or anti-virus scanning by application as files are uploaded (perhaps offloading the scanning using SCAP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Example ==&lt;br /&gt;
&lt;br /&gt;
Suppose a picture sharing application allows users to upload their .gif or .jpg graphic files to the web site. What if an attacker is able to upload a PHP shell, or exe file, or virus? The attacker may then upload the file that may be saved on the system and the virus may spread itself or through remote processes exes or shell code can be executed. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How to Test==&lt;br /&gt;
&lt;br /&gt;
Generic Testing Method&lt;br /&gt;
&lt;br /&gt;
• Review the project documentation and use exploratory testing looking at the application/system to identify what constitutes and &amp;quot;malicious&amp;quot; file in your environment. &lt;br /&gt;
&lt;br /&gt;
• Develop or acquire a known “malicious” file. An [http://www.eicar.org/85-0-Download.html EICAR anti-malware test file] can be used as harmless, but widely detected by antivirus software.&lt;br /&gt;
&lt;br /&gt;
• Try to upload the malicious file to the application/system and verify that it is correctly rejected.   &lt;br /&gt;
&lt;br /&gt;
• If multiple files can be uploaded at once, there must be tests in place to verify that each file is properly evaluated. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specific Testing Method 1&lt;br /&gt;
&lt;br /&gt;
•	Using the Metasploit payload generation functionality generates a shellcode as a Windows executable using the Metasploit &amp;quot;msfpayload&amp;quot; command.&lt;br /&gt;
&lt;br /&gt;
•	Submit the executable via the application’s upload functionality and see if it is accepted or properly rejected.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specific Testing Method 2&lt;br /&gt;
&lt;br /&gt;
•	Develop or create a file that should fail the application malware detection process. There are many available on the Internet such as ducklin.htm or ducklin-html.htm.  &lt;br /&gt;
&lt;br /&gt;
•	Submit the executable via the application’s upload functionality and see if it is accepted or properly rejected.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Specific Testing Method 3&lt;br /&gt;
&lt;br /&gt;
•	Set up the intercepting proxy to capture the “valid” request for an accepted file.&lt;br /&gt;
&lt;br /&gt;
•	Send an “invalid” request through with a valid/acceptable file extension and see if the  request is accepted or properly rejected.&lt;br /&gt;
&lt;br /&gt;
== Related Test Cases ==&lt;br /&gt;
&lt;br /&gt;
[[Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003)| Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] &lt;br /&gt;
&lt;br /&gt;
[[Test Upload of Unexpected File Types (OTG-BUSLOGIC-008)| Test Upload of Unexpected File Types (OTG-BUSLOGIC-008)]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
• Metasploit's payload generation functionality &lt;br /&gt;
&lt;br /&gt;
• Intercepting proxy&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==  &lt;br /&gt;
&lt;br /&gt;
OWASP - Unrestricted File Upload - https://www.owasp.org/index.php/Unrestricted_File_Upload&lt;br /&gt;
&lt;br /&gt;
Why File Upload Forms are a Major Security Threat - http://www.acunetix.com/websitesecurity/upload-forms-threat/&lt;br /&gt;
&lt;br /&gt;
File upload security best practices: Block a malicious file upload - http://www.computerweekly.com/answer/File-upload-security-best-practices-Block-a-malicious-file-upload&lt;br /&gt;
&lt;br /&gt;
Overview of Malicious File Upload Attacks - http://securitymecca.com/article/overview-of-malicious-file-upload-attacks/&lt;br /&gt;
&lt;br /&gt;
8 Basic Rules to Implement Secure File Uploads - http://software-security.sans.org/blog/2009/12/28/8-basic-rules-to-implement-secure-file-uploads&lt;br /&gt;
&lt;br /&gt;
Stop people uploading malicious PHP files via forms - http://stackoverflow.com/questions/602539/stop-people-uploading-malicious-php-files-via-forms&lt;br /&gt;
&lt;br /&gt;
How to Tell if a File is Malicious - http://www.techsupportalert.com/content/how-tell-if-file-malicious.htm&lt;br /&gt;
&lt;br /&gt;
CWE-434: Unrestricted Upload of File with Dangerous Type - http://cwe.mitre.org/data/definitions/434.html&lt;br /&gt;
&lt;br /&gt;
Implementing Secure File Upload - http://infosecauditor.wordpress.com/tag/malicious-file-upload/&lt;br /&gt;
&lt;br /&gt;
Watchful File Upload - http://palizine.plynt.com/issues/2011Apr/file-upload/&lt;br /&gt;
&lt;br /&gt;
Matasploit Generating Payloads - http://www.offensive-security.com/metasploit-unleashed/Generating_Payloads&lt;br /&gt;
&lt;br /&gt;
Project Shellcode – Shellcode Tutorial 9: Generating Shellcode Using Metasploit&lt;br /&gt;
http://www.projectshellcode.com/?q=node/29&lt;br /&gt;
&lt;br /&gt;
Anti-Malware Test file - http://www.eicar.org/86-0-Intended-use.html&lt;br /&gt;
&lt;br /&gt;
== Remediation ==&lt;br /&gt;
&lt;br /&gt;
While safeguards such as black or white listing of file extensions, using “Content-Type” from the header, or using a file type recognizer may not always be protections against this type of vulnerability. Every application that accepts files from users must have a mechanism to verify that the uploaded file does not contain malicious code. Uploaded files should never be stored where the users or attackers can directly access them.&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=194825</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=194825"/>
				<updated>2015-05-14T10:14:43Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://www.linkedin.com/in/4security LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/landon_mayo Twitter]&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs to prank my friends and the occasional teacher. I discovered IRC in 4th grade and had a dedicated computer in my room connected to IRC at all times next to my TV. After that, I continued to be a “closet hacker”, all the way until recent years. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
landon . mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=194824</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=194824"/>
				<updated>2015-05-14T10:14:00Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://www.linkedin.com/in/4security LinkedIn]&lt;br /&gt;
[https://twitter.com/landon_mayo @landon_mayo | Twitter]&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs to prank my friends and the occasional teacher. I discovered IRC in 4th grade and had a dedicated computer in my room connected to IRC at all times next to my TV. After that, I continued to be a “closet hacker”, all the way until recent years. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
landon . mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Unrestricted_File_Upload&amp;diff=194823</id>
		<title>Unrestricted File Upload</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Unrestricted_File_Upload&amp;diff=194823"/>
				<updated>2015-05-14T10:09:20Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: /* Authors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Description  ==&lt;br /&gt;
&lt;br /&gt;
Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then the attack only needs to find a way to get the code executed. Using a file upload helps the attacker accomplish the first step.&lt;br /&gt;
&lt;br /&gt;
The consequences of unrestricted file upload can vary, including complete system takeover, an overloaded file system or database, forwarding attacks to back-end systems, and simple defacement. It depends on what the application does with the uploaded file and especially where it is stored.&lt;br /&gt;
&lt;br /&gt;
There are really two classes of problems here. The first is with the file metadata, like the path and file name. These are generally provided by the transport, such as HTTP multi-part encoding. This data may trick the application into overwriting a critical file or storing the file in a bad location. You must validate the metadata extremely carefully before using it.&lt;br /&gt;
&lt;br /&gt;
The other class of problem is with the file size or content. The range of problems here depends entirely on what the file is used for. See the examples below for some ideas about how files might be misused. To protect against this type of attack, you should analyze everything your application does with files and think carefully about what processing and interpreters are involved.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
&lt;br /&gt;
* The impact of this vulnerability is high, supposed code can be executed in the server context or on the client. The likelihood of a detection for the attacker is high. The prevalence is common. As a result the severity of this type of vulnerability is High.&lt;br /&gt;
* The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth. This may also result in a defacement.&lt;br /&gt;
* An attacker might be able to put a phishing page into the website.&lt;br /&gt;
* An attacker might be able to put stored XSS into the website.&lt;br /&gt;
&amp;lt;!-- *Local file inclusion vulnerabilities can be exploited by uploading a malicious file into the server. --&amp;gt;&lt;br /&gt;
* This vulnerability can make the website vulnerable to some other types of attacks such as [[Cross-site Scripting (XSS)|XSS]].&lt;br /&gt;
* Picture uploads may trigger vulnerabilities in broken picture libraries on a client (libtiff, IE had problems in the past) if the picture is published 1:1.&lt;br /&gt;
* Script code or other code may be embedded in the uploaded file, which gets executed if the picture is published 1:1.&lt;br /&gt;
* Local vulnerabilities of real-time monitoring tools, such as an antivirus, can be exploited.&lt;br /&gt;
* A malicious file (Unix shell script, windows virus, reverse shell) can be uploaded on the server in order to execute code by an administrator or webmaster later -- on the server or on a client of the admin or webmaster.&lt;br /&gt;
* The web server might be used as a server in order to host of malware, illegal software, porn, and other objects.&lt;br /&gt;
&lt;br /&gt;
== Examples  ==&lt;br /&gt;
&lt;br /&gt;
=== Attacks on application platform  ===&lt;br /&gt;
&lt;br /&gt;
*Upload .jsp file into web tree - jsp code executed as web user &lt;br /&gt;
*Upload .gif to be resized - image library flaw exploited &lt;br /&gt;
*Upload huge files - file space denial of service &lt;br /&gt;
*Upload file using malicious path or name - overwrite critical file &lt;br /&gt;
*Upload file containing personal data - other users access it &lt;br /&gt;
*Upload file containing &amp;quot;tags&amp;quot; - tags get executed as part of being &amp;quot;included&amp;quot; in a web page&lt;br /&gt;
&lt;br /&gt;
=== Attacks on other systems  ===&lt;br /&gt;
&lt;br /&gt;
*Upload .exe file into web tree - victims download trojaned executable &lt;br /&gt;
*Upload virus infected file - victims' machines infected &lt;br /&gt;
*Upload .html file containing script - victim experiences [[Cross-site Scripting (XSS)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Weak Protection Methods and Methods of Bypassing  ==&lt;br /&gt;
&lt;br /&gt;
=== Using Black-List for Files’ Extensions  ===&lt;br /&gt;
&lt;br /&gt;
Some web applications still use only a black-list of extensions to prevent from uploading a malicious file. &lt;br /&gt;
&lt;br /&gt;
*It is possible to bypass this protection by using some extensions which are executable on the server but are not mentioned in the list. (Example: “file.php5”, “file.shtml”, “file.asa”, or “file.cer”) &lt;br /&gt;
*Sometimes it is possible to bypass this protection by changing some letters of extension to the capital form (example: “file.aSp” or “file.PHp3”). &lt;br /&gt;
*Using trailing spaces and/or dots at the end of the filename can sometimes cause bypassing the protection. These spaces and/or dots at the end of the filename will be removed when the file wants to be saved on the hard disk automatically. The filename can be sent to the server by using a local proxy or using a simple script (example: “file.asp ... ... . . .. ..”, “file.asp ”, or “file.asp.”).&lt;br /&gt;
*A web-server may use the first extension after the first dot (“.”) in the file name or use a specific priority algorithm to detect the file extension. Therefore, protection can be bypassed by uploading a file with two extensions after the dot character. The first one is forbidden, and the second one is permitted (example: “file.php.jpg”).&lt;br /&gt;
*In case of using IIS6 (or prior versions), it might be possible to bypass this protection by adding a semi-colon after the forbidden extension and before the permitted extension (example: “file.asp;.jpg”).&lt;br /&gt;
*In case of using IIS6 (or prior versions), it might be possible to bypass this protection by putting an executive file such as ASP with another extension in a folder which ends with an executive extension such as “.asp” (example: “folder.asp\file.txt”). Besides, it is possible to create a directory just by using a file uploader and ADS (Alternate Data Stream). In this method, filename should end with “::$Index_Allocation” or “:$I30:$Index_Allocation” to create a directory instead of a file (example:  “newfolder.asp::$Index_Allocation” creates “newfolder.asp” as a new directory).&lt;br /&gt;
*This protection can be completely bypassed by using the e.g. control characters like Null (0x00) after the forbidden extension and before the permitted one. In this method, during the saving process all the strings after the Null character will be discarded. Putting a Null character in the filename can be simply done by using a local proxy or by using a script (example: “file.asp%00.jpg”). Besides, it would be perfect if the Null character is inserted directly by using the Hex view option of a local proxy such as Burpsuite or Webscarab in the right place (without using&amp;amp;nbsp;%). &lt;br /&gt;
*It is also possible to create a file with a forbidden extension by using NTFS alternate data stream (ADS). In this case, a “:” sign will be inserted after the forbidden extension and before the permitted one. As a result, an empty file with the forbidden extension will be created on the server (example: “file.asp:.jpg”). Attacker can try to edit this file later to execute his/her malicious codes. However, an empty file is not always good for an attacker. So, there is an invented method by the author of this paper in which an attacker can upload a non-empty shell file by using the ADS. In this method, a forbidden file can be uploaded by using this pattern: “file.asp::$data.”.&lt;br /&gt;
*In Windows Servers, it is possible to replace the files by using their short-name (8.3). (example: “web.config” can be replaced by uploading “web~1.con”)&lt;br /&gt;
*Sometimes combination of the above can lead to bypassing the protections.&lt;br /&gt;
&lt;br /&gt;
=== Using White-List for Files’ Extensions  ===&lt;br /&gt;
&lt;br /&gt;
Many web applications use a white-list to accept the files’ extensions. Although using white-list is one of the recommendations, it is not enough on its own. Without having input validation, there is still a chance for an attacker to bypass the protections. &lt;br /&gt;
&lt;br /&gt;
*the 3rd, 4th, 5th, and 6th methods of last section apply here as well. &lt;br /&gt;
*The list of permitted extensions should be reviewed as it can contain malicious extension as well. For instance, in case of having “.shtml” in the list, the application can be vulnerable to SSI attacks.&lt;br /&gt;
&lt;br /&gt;
=== Using “Content-Type” from the Header  ===&lt;br /&gt;
&lt;br /&gt;
“Content-Type” entity in the header of the request indicates the Internet media type of the message content . Sometimes web applications use this parameter in order to recognize a file as a good one. For instance, they only accept the files with the “Content-Type” of “text/plain”. &lt;br /&gt;
&lt;br /&gt;
*It is possible to bypass this protection by changing this parameter in the request header by using a local proxy.&lt;br /&gt;
&lt;br /&gt;
=== Using a File Type Recogniser  ===&lt;br /&gt;
&lt;br /&gt;
Sometimes web applications intentionally or unintentionally use some functions (or APIs) to check the type of the file in order to do further process. For instance, in case of having image resizing, it is probable to have image type recogniser. &lt;br /&gt;
&lt;br /&gt;
*Sometimes the recognisers just read the few first characters (or header) of the files in order to check them. In this case, an attacker can insert the malicious code after some valid header. &lt;br /&gt;
*There are always some places in the structure of the files which are for the comments section and have no effect on the main file. And, an attacker can insert malicious codes in these points. &lt;br /&gt;
*Also, it is not impossible to think about a file modifier (for example an image resizer) which produces malicious codes itself in case of receiving special input.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Prevention Methods (Solutions to be more secure) ==&lt;br /&gt;
In order to make a Windows server more secure, it is very important to follow the Microsoft security best practices first. For this purpose, some of the useful links are:&lt;br /&gt;
*IIS 6.0 Security Best Practices[http://technet.microsoft.com/en-us/library/cc782762(WS.10).aspx]&lt;br /&gt;
*Securing Sites with Web Site Permissions[http://technet.microsoft.com/en-us/library/cc756133(WS.10).aspx]&lt;br /&gt;
*IIS 6.0 Operations Guide[http://technet.microsoft.com/en-us/library/cc785089(WS.10).aspx]&lt;br /&gt;
*Improving Web Application Security: Threats and Countermeasures[http://msdn.microsoft.com/en-us/library/ms994921.aspx]&lt;br /&gt;
*Understanding the Built-In User and Group Accounts in IIS 7.0[http://learn.iis.net/page.aspx/140/understanding-the-built-in-user-and-group-accounts-in-iis-70/]&lt;br /&gt;
*IIS Security Checklist[http://windows.stanford.edu/docs/IISsecchecklist.htm]&lt;br /&gt;
And some special recommendations for the developers and webmasters:&lt;br /&gt;
*Never accept a filename and its extension directly without having a white-list filter.&lt;br /&gt;
*It is necessary to have a list of only permitted extensions on the web application. And, file extension can be selected from the list. For instance, it can be a “select case” syntax (in case of having VBScript) to choose the file extension in regard to the real file extension.&lt;br /&gt;
*All the control characters  and Unicode ones should be removed from the filenames and their extensions without any exception. Also, the special characters such as “;”, “:”, “&amp;gt;”, “&amp;lt;”, “/” ,”\”, additional “.”, “*”, “%”, “$”, and so on should be discarded as well. If it is applicable and there is no need to have Unicode characters, it is highly recommended to only accept Alpha-Numeric characters and only 1 dot as an input for the file name and the extension; in which the file name and also the extension should not be empty at all (regular expression: [a-zA-Z0-9]{1,200}\.[a-zA-Z0-9]{1,10}).&lt;br /&gt;
*Limit the filename length. For instance, the maximum length of the name of a file plus its extension should be less than 255 characters (without any directory) in an NTFS partition.&lt;br /&gt;
*It is recommended to use an algorithm to determine the filenames. For instance, a filename can be a MD5 hash of the name of file plus the date of the day.&lt;br /&gt;
*Uploaded directory should not have any “execute” permission.&lt;br /&gt;
*Limit the file size to a maximum value in order to prevent denial of service attacks (on file space or other web application’s functions such as the image resizer).&lt;br /&gt;
*Restrict small size files as they can lead to denial of service attacks. So, the minimum size of files should be considered.&lt;br /&gt;
*Use Cross Site Request Forgery protection methods.&lt;br /&gt;
*Prevent from overwriting a file in case of having the same hash for both.&lt;br /&gt;
*Use a virus scanner on the server (if it is applicable). Or, if the contents of files are not confidential, a free virus scanner website can be used. In this case, file should be stored with a random name and without any extension on the server first, and after the virus checking (uploading to a free virus scanner website and getting back the result), it can be renamed to its specific name and extension.&lt;br /&gt;
*Try to use POST method instead of PUT (or GET!)&lt;br /&gt;
*Log users’ activities. However, the logging mechanism should be secured against log forgery and code injection itself.&lt;br /&gt;
*In case of having compressed file extract functions, contents of the compressed file should be checked one by one as a new file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related [[Attacks]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[Path Traversal]]&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
* [[Relative Path Traversal]]&lt;br /&gt;
* [[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Related [[Controls]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
== Related [[Threat Agent]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:External Threat Agent]]&lt;br /&gt;
* [[:Category:Internal Threat Agent]]&lt;br /&gt;
* [[:Category:Internet attacker]]&lt;br /&gt;
* [[:Category:Intranet attacker]]&lt;br /&gt;
&lt;br /&gt;
== Related [[Technical Impacts]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[System Access]]&lt;br /&gt;
* [[Security Bypass]]&lt;br /&gt;
* [[Exposure of system information]]&lt;br /&gt;
* [[Exposure of sensitive information]]&lt;br /&gt;
* [[Client Side Threat]]&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*Improve File Uploaders’ Protections – Bypass Methods- Rev. 1.0 http://soroush.secproject.com/blog/2010/03/improve-file-uploaders%e2%80%99-protections-rev-1-0/ &lt;br /&gt;
*8 basic rules to implement secure file uploads - SANS - http://software-security.sans.org/blog/2009/12/28/8-basic-rules-to-implement-secure-file-uploads&lt;br /&gt;
*IIS6/ASP &amp;amp; file upload for fun and profit http://blog.48bits.com/2010/09/28/iis6-asp-file-upload-for-fun-and-profit/&lt;br /&gt;
*Secure file upload in PHP web applications http://www.net-security.org/dl/articles/php-file-upload.pdf&lt;br /&gt;
*Potentially Dangerous File Types http://www.windowsitpro.com/Files/18/27072/Webtable_01.pdf&lt;br /&gt;
*Image Upload XSS http://ha.ckers.org/blog/20070603/image-upload-xss/&lt;br /&gt;
*Code Execution Through Filenames in Uploads http://ha.ckers.org/blog/20070620/code-execution-through-filenames-in-uploads/&lt;br /&gt;
*Secure File Upload Check List With PHP http://hungred.com/useful-information/secure-file-upload-check-list-php/&lt;br /&gt;
*NTFS in WikiPedia http://en.wikipedia.org/wiki/NTFS&lt;br /&gt;
*NTFS Streams http://msdn.microsoft.com/en-us/library/ff469210(v=PROT.10).aspx&lt;br /&gt;
*NTFS - Glossary http://inform.pucp.edu.pe/~inf232/Ntfs/ntfs_doc_v0.5/help/glossary.html&lt;br /&gt;
*IIS 6.0 Security Best Practices http://technet.microsoft.com/en-us/library/cc782762(WS.10).aspx&lt;br /&gt;
*Securing Sites with Web Site Permissions http://technet.microsoft.com/en-us/library/cc756133(WS.10).aspx&lt;br /&gt;
*IIS 6.0 Operations Guide http://technet.microsoft.com/en-us/library/cc785089(WS.10).aspx&lt;br /&gt;
*Improving Web Application Security: Threats and Countermeasures http://msdn.microsoft.com/en-us/library/ms994921.aspx&lt;br /&gt;
*Understanding the Built-In User and Group Accounts in IIS 7.0 http://learn.iis.net/page.aspx/140/understanding-the-built-in-user-and-group-accounts-in-iis-70/&lt;br /&gt;
*IIS Security Checklist http://windows.stanford.edu/docs/IISsecchecklist.htm&lt;br /&gt;
*Microsoft IIS ASP Multiple Extensions Security Bypass http://secunia.com/advisories/37831/&lt;br /&gt;
*CVE-2009-4444 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4444&lt;br /&gt;
*CVE-2009-4445 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4445&lt;br /&gt;
*CVE-2009-1535 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1535&lt;br /&gt;
&lt;br /&gt;
== Authors ==&lt;br /&gt;
*[[User:Soroush Dalili|Soroush Dalili]]&lt;br /&gt;
*[[User:Dirk Wetter|Dirk Wetter]]&lt;br /&gt;
*[[User:Landon Mayo|Landon Mayo]]&lt;br /&gt;
*[[User:OWASP|OWASP]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:File System]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Unix]]&lt;br /&gt;
[[Category:Use of Dangerous API]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Unrestricted_File_Upload&amp;diff=194822</id>
		<title>Unrestricted File Upload</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Unrestricted_File_Upload&amp;diff=194822"/>
				<updated>2015-05-14T10:08:43Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Description  ==&lt;br /&gt;
&lt;br /&gt;
Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then the attack only needs to find a way to get the code executed. Using a file upload helps the attacker accomplish the first step.&lt;br /&gt;
&lt;br /&gt;
The consequences of unrestricted file upload can vary, including complete system takeover, an overloaded file system or database, forwarding attacks to back-end systems, and simple defacement. It depends on what the application does with the uploaded file and especially where it is stored.&lt;br /&gt;
&lt;br /&gt;
There are really two classes of problems here. The first is with the file metadata, like the path and file name. These are generally provided by the transport, such as HTTP multi-part encoding. This data may trick the application into overwriting a critical file or storing the file in a bad location. You must validate the metadata extremely carefully before using it.&lt;br /&gt;
&lt;br /&gt;
The other class of problem is with the file size or content. The range of problems here depends entirely on what the file is used for. See the examples below for some ideas about how files might be misused. To protect against this type of attack, you should analyze everything your application does with files and think carefully about what processing and interpreters are involved.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
&lt;br /&gt;
* The impact of this vulnerability is high, supposed code can be executed in the server context or on the client. The likelihood of a detection for the attacker is high. The prevalence is common. As a result the severity of this type of vulnerability is High.&lt;br /&gt;
* The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth. This may also result in a defacement.&lt;br /&gt;
* An attacker might be able to put a phishing page into the website.&lt;br /&gt;
* An attacker might be able to put stored XSS into the website.&lt;br /&gt;
&amp;lt;!-- *Local file inclusion vulnerabilities can be exploited by uploading a malicious file into the server. --&amp;gt;&lt;br /&gt;
* This vulnerability can make the website vulnerable to some other types of attacks such as [[Cross-site Scripting (XSS)|XSS]].&lt;br /&gt;
* Picture uploads may trigger vulnerabilities in broken picture libraries on a client (libtiff, IE had problems in the past) if the picture is published 1:1.&lt;br /&gt;
* Script code or other code may be embedded in the uploaded file, which gets executed if the picture is published 1:1.&lt;br /&gt;
* Local vulnerabilities of real-time monitoring tools, such as an antivirus, can be exploited.&lt;br /&gt;
* A malicious file (Unix shell script, windows virus, reverse shell) can be uploaded on the server in order to execute code by an administrator or webmaster later -- on the server or on a client of the admin or webmaster.&lt;br /&gt;
* The web server might be used as a server in order to host of malware, illegal software, porn, and other objects.&lt;br /&gt;
&lt;br /&gt;
== Examples  ==&lt;br /&gt;
&lt;br /&gt;
=== Attacks on application platform  ===&lt;br /&gt;
&lt;br /&gt;
*Upload .jsp file into web tree - jsp code executed as web user &lt;br /&gt;
*Upload .gif to be resized - image library flaw exploited &lt;br /&gt;
*Upload huge files - file space denial of service &lt;br /&gt;
*Upload file using malicious path or name - overwrite critical file &lt;br /&gt;
*Upload file containing personal data - other users access it &lt;br /&gt;
*Upload file containing &amp;quot;tags&amp;quot; - tags get executed as part of being &amp;quot;included&amp;quot; in a web page&lt;br /&gt;
&lt;br /&gt;
=== Attacks on other systems  ===&lt;br /&gt;
&lt;br /&gt;
*Upload .exe file into web tree - victims download trojaned executable &lt;br /&gt;
*Upload virus infected file - victims' machines infected &lt;br /&gt;
*Upload .html file containing script - victim experiences [[Cross-site Scripting (XSS)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Weak Protection Methods and Methods of Bypassing  ==&lt;br /&gt;
&lt;br /&gt;
=== Using Black-List for Files’ Extensions  ===&lt;br /&gt;
&lt;br /&gt;
Some web applications still use only a black-list of extensions to prevent from uploading a malicious file. &lt;br /&gt;
&lt;br /&gt;
*It is possible to bypass this protection by using some extensions which are executable on the server but are not mentioned in the list. (Example: “file.php5”, “file.shtml”, “file.asa”, or “file.cer”) &lt;br /&gt;
*Sometimes it is possible to bypass this protection by changing some letters of extension to the capital form (example: “file.aSp” or “file.PHp3”). &lt;br /&gt;
*Using trailing spaces and/or dots at the end of the filename can sometimes cause bypassing the protection. These spaces and/or dots at the end of the filename will be removed when the file wants to be saved on the hard disk automatically. The filename can be sent to the server by using a local proxy or using a simple script (example: “file.asp ... ... . . .. ..”, “file.asp ”, or “file.asp.”).&lt;br /&gt;
*A web-server may use the first extension after the first dot (“.”) in the file name or use a specific priority algorithm to detect the file extension. Therefore, protection can be bypassed by uploading a file with two extensions after the dot character. The first one is forbidden, and the second one is permitted (example: “file.php.jpg”).&lt;br /&gt;
*In case of using IIS6 (or prior versions), it might be possible to bypass this protection by adding a semi-colon after the forbidden extension and before the permitted extension (example: “file.asp;.jpg”).&lt;br /&gt;
*In case of using IIS6 (or prior versions), it might be possible to bypass this protection by putting an executive file such as ASP with another extension in a folder which ends with an executive extension such as “.asp” (example: “folder.asp\file.txt”). Besides, it is possible to create a directory just by using a file uploader and ADS (Alternate Data Stream). In this method, filename should end with “::$Index_Allocation” or “:$I30:$Index_Allocation” to create a directory instead of a file (example:  “newfolder.asp::$Index_Allocation” creates “newfolder.asp” as a new directory).&lt;br /&gt;
*This protection can be completely bypassed by using the e.g. control characters like Null (0x00) after the forbidden extension and before the permitted one. In this method, during the saving process all the strings after the Null character will be discarded. Putting a Null character in the filename can be simply done by using a local proxy or by using a script (example: “file.asp%00.jpg”). Besides, it would be perfect if the Null character is inserted directly by using the Hex view option of a local proxy such as Burpsuite or Webscarab in the right place (without using&amp;amp;nbsp;%). &lt;br /&gt;
*It is also possible to create a file with a forbidden extension by using NTFS alternate data stream (ADS). In this case, a “:” sign will be inserted after the forbidden extension and before the permitted one. As a result, an empty file with the forbidden extension will be created on the server (example: “file.asp:.jpg”). Attacker can try to edit this file later to execute his/her malicious codes. However, an empty file is not always good for an attacker. So, there is an invented method by the author of this paper in which an attacker can upload a non-empty shell file by using the ADS. In this method, a forbidden file can be uploaded by using this pattern: “file.asp::$data.”.&lt;br /&gt;
*In Windows Servers, it is possible to replace the files by using their short-name (8.3). (example: “web.config” can be replaced by uploading “web~1.con”)&lt;br /&gt;
*Sometimes combination of the above can lead to bypassing the protections.&lt;br /&gt;
&lt;br /&gt;
=== Using White-List for Files’ Extensions  ===&lt;br /&gt;
&lt;br /&gt;
Many web applications use a white-list to accept the files’ extensions. Although using white-list is one of the recommendations, it is not enough on its own. Without having input validation, there is still a chance for an attacker to bypass the protections. &lt;br /&gt;
&lt;br /&gt;
*the 3rd, 4th, 5th, and 6th methods of last section apply here as well. &lt;br /&gt;
*The list of permitted extensions should be reviewed as it can contain malicious extension as well. For instance, in case of having “.shtml” in the list, the application can be vulnerable to SSI attacks.&lt;br /&gt;
&lt;br /&gt;
=== Using “Content-Type” from the Header  ===&lt;br /&gt;
&lt;br /&gt;
“Content-Type” entity in the header of the request indicates the Internet media type of the message content . Sometimes web applications use this parameter in order to recognize a file as a good one. For instance, they only accept the files with the “Content-Type” of “text/plain”. &lt;br /&gt;
&lt;br /&gt;
*It is possible to bypass this protection by changing this parameter in the request header by using a local proxy.&lt;br /&gt;
&lt;br /&gt;
=== Using a File Type Recogniser  ===&lt;br /&gt;
&lt;br /&gt;
Sometimes web applications intentionally or unintentionally use some functions (or APIs) to check the type of the file in order to do further process. For instance, in case of having image resizing, it is probable to have image type recogniser. &lt;br /&gt;
&lt;br /&gt;
*Sometimes the recognisers just read the few first characters (or header) of the files in order to check them. In this case, an attacker can insert the malicious code after some valid header. &lt;br /&gt;
*There are always some places in the structure of the files which are for the comments section and have no effect on the main file. And, an attacker can insert malicious codes in these points. &lt;br /&gt;
*Also, it is not impossible to think about a file modifier (for example an image resizer) which produces malicious codes itself in case of receiving special input.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Prevention Methods (Solutions to be more secure) ==&lt;br /&gt;
In order to make a Windows server more secure, it is very important to follow the Microsoft security best practices first. For this purpose, some of the useful links are:&lt;br /&gt;
*IIS 6.0 Security Best Practices[http://technet.microsoft.com/en-us/library/cc782762(WS.10).aspx]&lt;br /&gt;
*Securing Sites with Web Site Permissions[http://technet.microsoft.com/en-us/library/cc756133(WS.10).aspx]&lt;br /&gt;
*IIS 6.0 Operations Guide[http://technet.microsoft.com/en-us/library/cc785089(WS.10).aspx]&lt;br /&gt;
*Improving Web Application Security: Threats and Countermeasures[http://msdn.microsoft.com/en-us/library/ms994921.aspx]&lt;br /&gt;
*Understanding the Built-In User and Group Accounts in IIS 7.0[http://learn.iis.net/page.aspx/140/understanding-the-built-in-user-and-group-accounts-in-iis-70/]&lt;br /&gt;
*IIS Security Checklist[http://windows.stanford.edu/docs/IISsecchecklist.htm]&lt;br /&gt;
And some special recommendations for the developers and webmasters:&lt;br /&gt;
*Never accept a filename and its extension directly without having a white-list filter.&lt;br /&gt;
*It is necessary to have a list of only permitted extensions on the web application. And, file extension can be selected from the list. For instance, it can be a “select case” syntax (in case of having VBScript) to choose the file extension in regard to the real file extension.&lt;br /&gt;
*All the control characters  and Unicode ones should be removed from the filenames and their extensions without any exception. Also, the special characters such as “;”, “:”, “&amp;gt;”, “&amp;lt;”, “/” ,”\”, additional “.”, “*”, “%”, “$”, and so on should be discarded as well. If it is applicable and there is no need to have Unicode characters, it is highly recommended to only accept Alpha-Numeric characters and only 1 dot as an input for the file name and the extension; in which the file name and also the extension should not be empty at all (regular expression: [a-zA-Z0-9]{1,200}\.[a-zA-Z0-9]{1,10}).&lt;br /&gt;
*Limit the filename length. For instance, the maximum length of the name of a file plus its extension should be less than 255 characters (without any directory) in an NTFS partition.&lt;br /&gt;
*It is recommended to use an algorithm to determine the filenames. For instance, a filename can be a MD5 hash of the name of file plus the date of the day.&lt;br /&gt;
*Uploaded directory should not have any “execute” permission.&lt;br /&gt;
*Limit the file size to a maximum value in order to prevent denial of service attacks (on file space or other web application’s functions such as the image resizer).&lt;br /&gt;
*Restrict small size files as they can lead to denial of service attacks. So, the minimum size of files should be considered.&lt;br /&gt;
*Use Cross Site Request Forgery protection methods.&lt;br /&gt;
*Prevent from overwriting a file in case of having the same hash for both.&lt;br /&gt;
*Use a virus scanner on the server (if it is applicable). Or, if the contents of files are not confidential, a free virus scanner website can be used. In this case, file should be stored with a random name and without any extension on the server first, and after the virus checking (uploading to a free virus scanner website and getting back the result), it can be renamed to its specific name and extension.&lt;br /&gt;
*Try to use POST method instead of PUT (or GET!)&lt;br /&gt;
*Log users’ activities. However, the logging mechanism should be secured against log forgery and code injection itself.&lt;br /&gt;
*In case of having compressed file extract functions, contents of the compressed file should be checked one by one as a new file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related [[Attacks]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[Path Traversal]]&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
* [[Relative Path Traversal]]&lt;br /&gt;
* [[Windows_::DATA_alternate_data_stream]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
== Related [[Controls]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
== Related [[Threat Agent]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:External Threat Agent]]&lt;br /&gt;
* [[:Category:Internal Threat Agent]]&lt;br /&gt;
* [[:Category:Internet attacker]]&lt;br /&gt;
* [[:Category:Intranet attacker]]&lt;br /&gt;
&lt;br /&gt;
== Related [[Technical Impacts]]  ==&lt;br /&gt;
&lt;br /&gt;
* [[System Access]]&lt;br /&gt;
* [[Security Bypass]]&lt;br /&gt;
* [[Exposure of system information]]&lt;br /&gt;
* [[Exposure of sensitive information]]&lt;br /&gt;
* [[Client Side Threat]]&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*Improve File Uploaders’ Protections – Bypass Methods- Rev. 1.0 http://soroush.secproject.com/blog/2010/03/improve-file-uploaders%e2%80%99-protections-rev-1-0/ &lt;br /&gt;
*8 basic rules to implement secure file uploads - SANS - http://software-security.sans.org/blog/2009/12/28/8-basic-rules-to-implement-secure-file-uploads&lt;br /&gt;
*IIS6/ASP &amp;amp; file upload for fun and profit http://blog.48bits.com/2010/09/28/iis6-asp-file-upload-for-fun-and-profit/&lt;br /&gt;
*Secure file upload in PHP web applications http://www.net-security.org/dl/articles/php-file-upload.pdf&lt;br /&gt;
*Potentially Dangerous File Types http://www.windowsitpro.com/Files/18/27072/Webtable_01.pdf&lt;br /&gt;
*Image Upload XSS http://ha.ckers.org/blog/20070603/image-upload-xss/&lt;br /&gt;
*Code Execution Through Filenames in Uploads http://ha.ckers.org/blog/20070620/code-execution-through-filenames-in-uploads/&lt;br /&gt;
*Secure File Upload Check List With PHP http://hungred.com/useful-information/secure-file-upload-check-list-php/&lt;br /&gt;
*NTFS in WikiPedia http://en.wikipedia.org/wiki/NTFS&lt;br /&gt;
*NTFS Streams http://msdn.microsoft.com/en-us/library/ff469210(v=PROT.10).aspx&lt;br /&gt;
*NTFS - Glossary http://inform.pucp.edu.pe/~inf232/Ntfs/ntfs_doc_v0.5/help/glossary.html&lt;br /&gt;
*IIS 6.0 Security Best Practices http://technet.microsoft.com/en-us/library/cc782762(WS.10).aspx&lt;br /&gt;
*Securing Sites with Web Site Permissions http://technet.microsoft.com/en-us/library/cc756133(WS.10).aspx&lt;br /&gt;
*IIS 6.0 Operations Guide http://technet.microsoft.com/en-us/library/cc785089(WS.10).aspx&lt;br /&gt;
*Improving Web Application Security: Threats and Countermeasures http://msdn.microsoft.com/en-us/library/ms994921.aspx&lt;br /&gt;
*Understanding the Built-In User and Group Accounts in IIS 7.0 http://learn.iis.net/page.aspx/140/understanding-the-built-in-user-and-group-accounts-in-iis-70/&lt;br /&gt;
*IIS Security Checklist http://windows.stanford.edu/docs/IISsecchecklist.htm&lt;br /&gt;
*Microsoft IIS ASP Multiple Extensions Security Bypass http://secunia.com/advisories/37831/&lt;br /&gt;
*CVE-2009-4444 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4444&lt;br /&gt;
*CVE-2009-4445 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4445&lt;br /&gt;
*CVE-2009-1535 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1535&lt;br /&gt;
&lt;br /&gt;
== Authors ==&lt;br /&gt;
*[[User:Soroush Dalili|Soroush Dalili]]&lt;br /&gt;
*[[User:Dirk Wetter|Dirk Wetter]]&lt;br /&gt;
*[[User:OWASP|OWASP]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:File System]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Unix]]&lt;br /&gt;
[[Category:Use of Dangerous API]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180148</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180148"/>
				<updated>2014-08-06T20:57:15Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Secure Development Training &lt;br /&gt;
Security Research and Development&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180147</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180147"/>
				<updated>2014-08-06T20:50:36Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = * Secure Development Training &lt;br /&gt;
* Security Research and Development&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180146</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180146"/>
				<updated>2014-08-06T20:49:20Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = * Secure Development Training; * Security Research and Development&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180145</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180145"/>
				<updated>2014-08-06T20:36:44Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = * Secure Development Training&lt;br /&gt;
* Security Research and Development &lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = Threat Modeling&lt;br /&gt;
| project_already_presented_url_4 = https://www.owasp.org/index.php/Threat_Risk_Modeling&lt;br /&gt;
| project_already_presented_name5 = Testing Guide&lt;br /&gt;
| project_already_presented_url_5 = https://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
| project_already_presented_name6 = Web Application Firewalls&lt;br /&gt;
| project_already_presented_url_6 = https://www.owasp.org/index.php/Best_Practices:_Web_Application_Firewalls&lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_31&lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_31&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180144</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180144"/>
				<updated>2014-08-06T20:28:48Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = * Secure Development Training&lt;br /&gt;
* Security Research and Development &lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name2 = ESAPI Enterprise Security&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = &lt;br /&gt;
| project_already_presented_url_4 = &lt;br /&gt;
| project_already_presented_name5 = &lt;br /&gt;
| project_already_presented_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_4 &lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_4 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Training&amp;diff=180143</id>
		<title>OWASP Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Training&amp;diff=180143"/>
				<updated>2014-08-06T20:20:56Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
=== OWASP Training - OWASP Projects and Resources you can use TODAY!  ===&lt;br /&gt;
&lt;br /&gt;
The main goal of '''OWASP Training''' is to support Local Chapters' training activities in a way that allows us to use a model that, despite specific and punctual adjustments, can be easily replicated and become the main frame for all Chapter-led training events. &lt;br /&gt;
&lt;br /&gt;
Furthermore, we will use the concept “'''OWASP projects and resources you can use TODAY!'''” &lt;br /&gt;
&lt;br /&gt;
In a nutshell, we are proposing a '''Chapter’s driven model with Local Chapter organization''' in which: &lt;br /&gt;
&lt;br /&gt;
* The courses are '''free for OWASP members''' - being that by the time of the training event anyone may become a member if they desire to do so; &lt;br /&gt;
* The contents are '''OWASP projects focused''' – to promote the awareness of our Projects and the understanding of how they fit into an Enterprise's security ecosystem or in its Web Application Development Life-cycle; &lt;br /&gt;
* The '''costs''' are '''supported by a mix of funding''' - local chapter budget, external sponsorship, trainers sponsorship (i.e. trip and/or accommodation paid by themselves) and local chapter members’ sponsorship (i.e. taking trainers in as guests).&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; |&lt;br /&gt;
'''If you would like to organize a training event of this sort''', please contact me after gathering the following information which will be our starting point: &lt;br /&gt;
* Date of the event; &lt;br /&gt;
* Venue and directions; &lt;br /&gt;
* Course’s details - with regard to the contents, we would suggest that the focus falls into the OWASP Projects with the most quality and Projects being developed by members of your local Chapter. &lt;br /&gt;
&lt;br /&gt;
'''The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable – do get involved!''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are interested in '''being part of OWASP's pool of Trainers''', check our '''[http://www.owasp.org/index.php/OWASP_Training#tab=Trainers_Database_-_Call_for_Trainers.21 CALL FOR TRAINERS tab]''' and add your name!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== '''Trainers Database - Call for Trainers!''' ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== '''CALL FOR TRAINERS - Trainers drive's goal'''  ===&lt;br /&gt;
&lt;br /&gt;
'''OWASP is looking for trainers''' to deliver training under the flag “OWASP projects and resources you can use today”. This is a model of training which is '''free for OWASP members''', '''delivered by OWASP Leaders''' (with only travel expenses paid) and '''covering OWASP modules and/or projects'''.&lt;br /&gt;
&lt;br /&gt;
'''If you are an OWASP Leader and would like to be included in OWASP's pool of trainers, this is your chance - add your name and info to the OWASP Trainers / Volunteers Table and be counted!''' &lt;br /&gt;
&lt;br /&gt;
The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable. In this context, the OWASP Training appears as an excellent vehicle to spread the knowledge and the word and that is why this is one of the areas we want to strongly focus on. &lt;br /&gt;
&lt;br /&gt;
'''Click [[OWASP Trainers Database Conditions|here]] for rules and conditions.'''&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Trainers Database ===&lt;br /&gt;
{{Template:OWASP_Trainers_Volunteers/Columns}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_0 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_1 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_2 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_3 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_4 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_5 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_6 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_7 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_8 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_9 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_10 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_11 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_12 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_14 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_15 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_16 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_17 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_18 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_19 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_20 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_21 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_22 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_23 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_24 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_25 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_26 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_27 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_28 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_29 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_30 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_31 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Videos &amp;amp; Pictures ====&lt;br /&gt;
&lt;br /&gt;
=== IBWAS'10 Training Day, 16 Dec 2010 ===&lt;br /&gt;
&lt;br /&gt;
{{:IBWAS10 Videos and Pictures}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Modules and Materials ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
=== Training Modules ===&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Code Crawler Project|OWASP Code Crawler Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Code Review Project|OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP DirBuster Project|OWASP DirBuster Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP ESAPI|OWASP ESAPI]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Guided tour of OWASP Projects|Guided tour of OWASP Projects]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP O2 Platform|OWASP O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Secure Coding Practices - Quick Reference Guide|OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Software Assurance Maturity Model|OWASP Software Assurance Maturity Model (SAMM)]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Testing Guide|OWASP Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Threat Risk Modeling|OWASP Threat Risk Modeling]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Top 10|OWASP Top 10]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP WebScarab Project|OWASP WebScarab Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/OWASP Webslayer Project|OWASP Webslayer Project]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP/Training/Implementation of Enigform for Wordpress|OWASP Enigform (and Jify)]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP/Training/OWASP Application Security Verification Standard (ASVS)|OWASP Application Security Verification Standard (ASVS)]]&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
=== OWASP Appsec Tutorial Series, by [[user:Jerryhoff|Jerry Hoff]] ===&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=CDbWvEwBBxo Episode 1: Appsec Basics]&lt;br /&gt;
*[http://www.youtube.com/watch?v=pypTYPaU7mM Episode 2: Injection Attacks] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Other Training Materials ===&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=OWASP%20Default%20Training.zip&amp;amp;can=2&amp;amp;q= OWASP Default Training]&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=London%20Training%20May%2028th%202010.zip&amp;amp;can=2&amp;amp;q= London Training May 28th 2010]&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/owasp-training/downloads/detail?name=London%20Training%20April%2016th%202010.zip&amp;amp;can=2&amp;amp;q= London Training April 16th 2010] &lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:Developing_Compliant_Applications.pdf Developing Compliant Applications (pdf)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:Developing_Secure_Applications_with_OWASP.pdf Developing Secure Applications with OWASP (pdf)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Videos ===&lt;br /&gt;
&lt;br /&gt;
'''IBWAS'10 Training Day sessions, 16th Dec 2010, Lisbon'''&lt;br /&gt;
&lt;br /&gt;
{{:IBWAS10 Training Day Sessions}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Library of Links ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
* Access to the collection of all pages associated to the [[:Category:OWASP Training|'''OWASP Training''']].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Training Templates ====&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;15&amp;quot; border=&amp;quot;0&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;200&amp;quot; | [[Image:Banner OWASP Training page.gif|border|center|362x247px]] &lt;br /&gt;
| &lt;br /&gt;
* If you want to organize an OWASP Free Training event, please check out the [[:Category:OWASP Free Training Templates|'''Training Templates''']].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Training Logos ====&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP Training Pictures }}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 = '''PROPOSAL 1A'''[[Image:Logo 1A.JPG]]&lt;br /&gt;
| Media_File2 = '''PROPOSAL 1B - Approved Version'''[[Image:Logo 1B.JPG]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 =  '''PROPOSAL 2'''[[Image:Logo 2.JPG]]&lt;br /&gt;
| Media_File2 =  '''PROPOSAL 3'''[[Image:Logo 3.JPG]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Training_Pictures_View &lt;br /&gt;
| Media_File1 =  '''PROPOSAL 4'''[[Image:Logo 4.JPG]]&lt;br /&gt;
| Media_File2 =  &lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Training|Training]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180142</id>
		<title>OWASP Trainers/Volunteer 31</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_31&amp;diff=180142"/>
				<updated>2014-08-06T20:17:19Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: Created page with &amp;quot;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt; |- | trainer_name1 = Landon Mayo  | trainer_email1 = landon.mayo@owasp.org | ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = Landon Mayo &lt;br /&gt;
| trainer_email1 = landon.mayo@owasp.org&lt;br /&gt;
| trainer_wiki_username1 = Landon Mayo&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = &lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = ESAPI (The OWASP Enterprise Security API) &lt;br /&gt;
| project_already_presented_url_1 = https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name2 = OWASP Top Ten&lt;br /&gt;
| project_already_presented_url_2 = https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;br /&gt;
| project_already_presented_name3 = OWASP Education Project&lt;br /&gt;
| project_already_presented_url_3 = https://www.owasp.org/index.php/Category:OWASP_Education_Project&lt;br /&gt;
| project_already_presented_name4 = &lt;br /&gt;
| project_already_presented_url_4 = &lt;br /&gt;
| project_already_presented_name5 = &lt;br /&gt;
| project_already_presented_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| current_location = Houston, TX  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_4 &lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_4 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers_Database&amp;diff=180139</id>
		<title>OWASP Trainers Database</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers_Database&amp;diff=180139"/>
				<updated>2014-08-06T18:34:37Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Trainers Drive Overview ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;1&amp;quot;  | &lt;br /&gt;
'''Call for Trainers - Trainers drive's goal and methodology explanation'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;200&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;0&amp;quot; rowspan=&amp;quot;0&amp;quot; | &lt;br /&gt;
*'''Call for OWASP TRAINERS'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP is looking for trainers to deliver training under the flag “OWASP projects and resources you can use today”. If you are an OWASP member and would like to be included in OWASP's pool of trainers, this is your chance - add your name and info to the OWASP Trainers / Volunteers Table and be counted! '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The role of the Local Chapters in reinforcing visibility of OWASP Projects within the local corporate communities and, by that, in encouraging the use and understanding of our tools and documentation is absolutely invaluable.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this context, the OWASP Training appears as an excellent vehicle to spread the knowledge and the word and that is why this is one of the areas we want to strongly focus on.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On this phase, we are calling for trainers to deliver training under the following conditions:&lt;br /&gt;
&lt;br /&gt;
* Training initiatives led and organized by Local Chapters;&lt;br /&gt;
* Courses '''free for OWASP members''' - being that by the time of the training event anyone may become a member if they desire to do so;&lt;br /&gt;
* '''Contents are based on OWASP projects / modules''' – to promote the awareness of our Projects and the understanding of how they fit into an Enterprise's security ecosystem or in its Web Application Development Life-cycle;&lt;br /&gt;
* '''Costs''' of the training event '''are supported by a mix of funding''' - local chapter budget, external sponsorship, trainers sponsorship (i.e. trip and/or accommodation paid by themselves) and local chapter members’ sponsorship (i.e. taking trainers in as guests).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that this is a non-paid component of OWASP Training.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OWASP Trainers/Volunteers ====&lt;br /&gt;
{{Template:OWASP_Trainers_Volunteers/Columns}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_1 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_2 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_3 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_4 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_5 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_6 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_7 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_8 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_9 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_10 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_11 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_12 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_13 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_14 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_15 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_16 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_17 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_18 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_19 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_20 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_21 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_22 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_23 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_24 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_25 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_26 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_27 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_28 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_29 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_30 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
{{:OWASP_Trainers/Volunteer_31 | OWASP_Trainers_Volunteers/Row}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Training|Training]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156091</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156091"/>
				<updated>2013-07-26T21:23:16Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156090</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156090"/>
				<updated>2013-07-26T21:22:17Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156089</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156089"/>
				<updated>2013-07-26T21:21:13Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156088</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156088"/>
				<updated>2013-07-26T21:19:53Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156087</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156087"/>
				<updated>2013-07-26T21:18:42Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp-houston-may-mini-con.eventbrite.com OWASP Houston May Mini-Con - Eventbrite]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156086</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156086"/>
				<updated>2013-07-26T21:14:59Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp-houston-may-mini-con.eventbrite.com OWASP Houston May Mini-Con - Eventbrite]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston August Mini-Con=====&lt;br /&gt;
=====Thursday, August 15 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston September Happy Hour=====&lt;br /&gt;
=====Thursday, September 19 at 6:00 PM=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston October Workshop=====&lt;br /&gt;
=====Thursday, October 17, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston November Mini-Con=====&lt;br /&gt;
=====Friday, November 15, 2013=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156085</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156085"/>
				<updated>2013-07-26T21:10:59Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp-houston-may-mini-con.eventbrite.com OWASP Houston May Mini-Con - Eventbrite]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston August Mini-Con====&lt;br /&gt;
====Thursday, August 15 at 6:00 PM====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====OWASP Houston September Happy Hour====&lt;br /&gt;
====Thursday, September 19 at 6:00 PM====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston October Workshop====&lt;br /&gt;
====Thursday, October 17, 2013====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====OWASP Houston November Mini-Con====&lt;br /&gt;
====Friday, November 15, 2013====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156060</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156060"/>
				<updated>2013-07-26T19:11:07Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour]&amp;lt;br&amp;gt; &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp-houston-may-mini-con.eventbrite.com OWASP Houston May Mini-Con - Eventbrite]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston August Mini-Con====&lt;br /&gt;
====Thursday, August 15 at 6:00 PM====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston September Happy Hour====&lt;br /&gt;
====Thursday, September 19 at 6:00 PM====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston October Workshop====&lt;br /&gt;
====Thursday, October 17, 2013====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston November Mini-Con====&lt;br /&gt;
====Friday, November 15, 2013====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Houston&amp;diff=156059</id>
		<title>Houston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Houston&amp;diff=156059"/>
				<updated>2013-07-26T19:10:12Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Houston|extra=The chapter Leaders are; [mailto:patrick.snyder@owasp.org Patrick Snyder], [mailto:paul.scott@owasp.org Paul Scott], Tyler Borland|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-houston|emailarchives=http://lists.owasp.org/pipermail/owasp-houston}}&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====Quick Links=====&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ OWASP Houston August Mini-Con] &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262/ OWASP Houston September Happy Hour] &lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ OWASP Houston October Workshop]&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128412212/ OWASP Houston November Mini-Con]&lt;br /&gt;
[https://owasp-houston-may-mini-con.eventbrite.com OWASP Houston May Mini-Con - Eventbrite]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/ OWASP Houston Chapter (Houston, TX) - Meetup]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://twitter.com/owasphouston/ OWASP Houston (owasphouston) on Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
=====Upcoming Events=====&lt;br /&gt;
We post new event details to keep you informed.  Our events are open to everyone.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Formal events such as conferences are limited and require RSVP. Expect quarterly 2013 Mini-Cons in February, May, August, and November. Quarterly Mini-Cons are formal with a minimum of 2 speaking engagements by highly regarded individuals.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Monthly Meetings are less formal and focus on networking, mingling, ideas, and enjoying the overall atmosphere.  Food, refreshments, and beverages are provided.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Additionally, Monthly Meetings will have a short 15-20 minute agenda involving a speech, panel, or workshop. There is always the ever popular lock picking station at each event as well.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston August Mini-Con====&lt;br /&gt;
====Thursday, August 15 at 6:00 PM====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
You Hear Me Now? Leveraging Mobile Devices on Pentests&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128410642/ Details] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston September Happy Hour====&lt;br /&gt;
====Thursday, September 19 at 6:00 PM====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us at Stag's Head pub on September 19th at 6PM for an OWASP Houston Happy Hour. Drinks are on us while the budget lasts. This will be the last Happy Hour meeting of the year.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411262 Details]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston October Workshop====&lt;br /&gt;
====Thursday, October 17, 2013====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1706 Yorktown St, Houston, TX&lt;br /&gt;
Please join us for another OWASP Houston workshop. This will be a hands on exercise in security topics.&lt;br /&gt;
[http://www.meetup.com/OWASP-Houston/events/128411572/ Details]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====OWASP Houston November Mini-Con====&lt;br /&gt;
====Friday, November 15, 2013====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites Houston Galleria&lt;br /&gt;
2400 West Loop S, Houston, TX&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details will be added. This will be the last meeting of the 2013 year for OWASP Houston. We will not be meeting in December.&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini-Con=====&lt;br /&gt;
=====Thursday, February 21, 2013 at 6PM CST=====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for our May Mini-Con, 6PM May 16th, at the Sheraton Suites, 2400 W. Loop South, Houston, Texas 77027. We're trying a new location this time. This is a free event, but space is limited. We will be providing food and beverage. Please register for a ticket to confirm your space at the event. If tickets are unavailable, we will have some standing room.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
We are pleased to annnounce the speakers and topics of the evening...&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Catching Flies with Mr Miyagi: Web Application Testing Techniques by Kevin Johnson&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk based loosely around the Karate kid movies, Kevin John (CEO of Secure Ideas) will walk through some techniques to improve your web penetration testing techniques.  Stop being the kid moved from NJ and dropped into a cruddy apartment.  Learn the wax on/off of testing modern web applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Kevin has performed a large number of trainings, briefings, and presentations for both public events and internal trainings. Kevin teaches for the SANS Institute on a number of subjects. He is the author of three classes- SEC542: Web Application Penetration Testing and Ethical Hacking, SEC642: Advanced Web Application Penetration Testing, and SEC571: Mobile Device Security. Kevin has presented at a large number of conventions, meetings, and industry events. Some examples of these are: DerbyCon, ShmooCon, DEFCON, Blackhat, ISACA, Infragard, and ISSA.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WTF, WAF Testing Framework by Terry Ray&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Terry Ray will be presenting an approach to evaluating web application firewall capabilities that is suitable to the real world use case. The methodology touches on issues like False Positive / False Negative rates, evasion techniques and white listing / black listing balance. He will demonstrate a tool that can be used by organizations to implement the methodology either when choosing an application protection solution or after deployment.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When and Where?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Thursday, May 16th from 6PM-9PM&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Sheraton Suites&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2400 W. Loop South&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Houston, Texas 77027&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For Directions: (713) 586-2444&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Seating is limited, so please read these directions carefully:&lt;br /&gt;
RSVP'ing on meetup.com will not guarantee entry to the event.  This is a limited capacity event.  If you would like to guarantee the availability of a seat please reserve a ticket with Eventbrite @ [https://owasp-houston-may-mini-con.eventbrite.com Reserve a Ticket]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsors=&lt;br /&gt;
'''[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://www.solidborder.com Solid Border | Network Security Reseller]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://barracuda.com Barracuda Networks]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.stachliu.com/ Stach &amp;amp; Liu]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://netflix.com Netflix - Watch TV Shows Online, Watch Movies Online]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''[https://secureideas.com/ Secure Ideas -- Professionally Evil]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=RSVP=&lt;br /&gt;
===RSVP===&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Please RSVP @ [http://www.meetup.com/owasp-houston meetup.com OWASP OWASP Houston Chapter] to ensure best accommodations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Events=&lt;br /&gt;
=====OWASP Houston March Happy Hour=====&lt;br /&gt;
=====Thursday, March 14, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, March 14, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=====OWASP Houston February Mini Con=====&lt;br /&gt;
=====Thursday, February 21st, 2013 at 6PM CST=====&lt;br /&gt;
Sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[https://imperva.com Imperva - Business Security Solutions - Complete Data Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://alertlogic.com Alert Logic Brings Network Security &amp;amp; Cloud Security Services to You]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Please join us for an OWASP Houston March Happy Hour.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
More details coming soon.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' Thursday, February 21st, 2013 at 6PM CST&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Westin Galleria, Imperial Suite&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===OWASP Houston January Workshop===&lt;br /&gt;
===Thursday, January 31st at 6PM===&lt;br /&gt;
Sponsored by: Imperva and AlertLogic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Join us for an OWASP Houston Workshop.  During this workshop, attendees will be lead through the process of discovering and reporting vulnerabilities.  We will start by reviewing source code for common vulnerabilities.  Once we identify interesting code, we will test the application to confirm our findings.  Finally, we will discuss reporting.  If you would like to participate please bring your laptop.  You should prepare a virtual machine with Linux, Apache, Mysql, and PHP. We will have members helping with virtual machine configurations and assistance.  If you just want to watch, that's fine too.  We look forward to your attendance.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' January 31st 2013 (Thursday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===OWASP Houston Kick-Off Meeting (Nov. 19th)===&lt;br /&gt;
We'll be reviewing survey results and trying to finalize some details like when and where to hold our meetings. If you want to get involved with OWASP Houston now is the time.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsored by:''' Imperva, Alert Logic&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''When:''' November 19th 2012 (Monday 6PM - 8PM)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Stag's Head Pub (Private Room) - 2128 Portsmouth Street Houston, TX 77098&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Phone:''' (713) 533-1199&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
We're always looking for sponsors to help us provide the highest quality experience for our attendees. For sponsoring OWASP Houston we will list your name on our site, mention your sponsorship in all announcements on the mailing list, send us a banner and we'll hang it at the event, and send you some pictures. If you'd like to send someone to attend the event we will make room for a table. We encourage sponsors to have raffles to try and capture leads. Rather than sponsoring just one event consider sponsoring a few from the 2013 series.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #0 - Workshops==&lt;br /&gt;
&lt;br /&gt;
We will have four workshops in 2013. These will be meetings dedicated to hands on education. This could be related to programming a vulnerability scanner, auditing source code, exploiting a vulnerability, or mini-ctf. Your sponsorship of this event includes appetizers and beverages for the attendees. Due to popularity, sponsoring a workshop is a $500 dollar commitment. For $2,000 dollars you can sponsor every workshop of 2013.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #1 - Happy Hour Meeting==&lt;br /&gt;
&lt;br /&gt;
We will have three happy hour meetings in 2013. These will be social meetings where attendees build a local security community. We estimating the need for $500 in food and drink per meeting. By giving sponsors drink tickets to hand to attendees, we ensure that our sponsors are able to interact with everyone looking for another drink. Feel free to pass out business cards and network just like you would anywhere else. We will have three of these types of meetings in 2013 so you can sponsor all of them for just $1,500. On months where we have a formal meeting we will not hold an informal meetup. &lt;br /&gt;
&lt;br /&gt;
==Opportunity #2 - Formal Presentation Meeting==&lt;br /&gt;
&lt;br /&gt;
At our quarterly meetings we will be hosting two quality presenters. Generally we try to pull one presenter from out of state. Your sponsorship of this event includes food and beverages for the attendees. We are seeking $700 per sponsor to cover our expenses. Consider supporting the Houston OWASP community by sponsoring all of our quarterly meetings for $2,800.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #3 - OWASP Presenter Sponsorship==&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters possible. In exchange for covering travel expenses for these presenters, our chapter will provide you with five minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. This benefit is in addition to special mention for sponsoring the travel. The speakers traveling expenses may vary but with a $1,200 donation we think we can handle the rest. &lt;br /&gt;
&lt;br /&gt;
==Opporutnity #4 - Meeting Space==&lt;br /&gt;
&lt;br /&gt;
We currently need funds to secure a stable meeting space for our quarterly presentations and workshops.&lt;br /&gt;
&lt;br /&gt;
==Opportunity #5 - Lock Pick Table==&lt;br /&gt;
&lt;br /&gt;
We are coordinating a lock picking table at every event. To help us get some new locks and create some mock door setups. For $1,000 bucks you can sponsor the table for a whole year. This opportunity is limited to one company. We'll credit you for it in all promotions, list you as a sponsor on the website.  The whole deal. &lt;br /&gt;
&lt;br /&gt;
=Call for Papers=&lt;br /&gt;
==Call for Papers==&lt;br /&gt;
We're actively accepting abstracts. Please send all abstracts to paul dot scott at owasp dot org.&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
==Local News==&lt;br /&gt;
Worthwhile information.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==November 5th 2012==&lt;br /&gt;
Houston OWASP Chapter has been activated. Please join us in making this a successful security meetup. First meeting to finalize details around 2013 series of meeting has been scheduled for November 19th, 2012. Please fill out the quick five question [http://www.surveymonkey.com/s/RWNWRZX survey] if you have not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Brute_Force_(OWASP-AT-004)&amp;diff=140848</id>
		<title>Testing for Brute Force (OWASP-AT-004)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Brute_Force_(OWASP-AT-004)&amp;diff=140848"/>
				<updated>2012-12-07T13:26:21Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: milw0rm has been down for a long time, netcraft shows 15-Jun-2010 is the last reported date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Brute forcing consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement. In web application testing, the problem we are going to face with the most is very often connected with the need of having a valid user account to access the inner part of the application.&lt;br /&gt;
Therefore we are going to check different types of authentication schema and the effectiveness of different brute-force  attacks.&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===Description of Brute Force Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the OWASP article on [[Brute_force_attack|Brute Force]] Attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
A great majority of web applications provide a way for users to authenticate themselves. By having knowledge of user's identity it's possible to create protected areas or, more generally, to have the application behave differently upon the logon of different users.&lt;br /&gt;
In general, there are several methods for a user to authenticate to a system, like certificates, biometric devices, OTP (One Time Password) tokens. However, in web applications, we usually find a combination of user ID and password. Therefore, it's possible to carry out an attack to retrieve a valid user account and password, by trying to enumerate many (i.e., dictionary attack) or all the possible candidates.&lt;br /&gt;
&lt;br /&gt;
After a successful brute force attack, a malicious user could have access to:&lt;br /&gt;
&lt;br /&gt;
* Confidential information / data;&lt;br /&gt;
** Private sections of a web application could disclose confidential documents, users' profile data, financial status, bank details, users' relationships, etc.&lt;br /&gt;
	&lt;br /&gt;
* Administration panels;&lt;br /&gt;
** These sections are used by webmasters to manage (modify, delete, add) web application content, manage user provisioning, assign different privileges to the users, etc.&lt;br /&gt;
&lt;br /&gt;
* Availability of further attack vectors;&lt;br /&gt;
** Private sections of a web application could hide dangerous vulnerabilities and contain advanced functionalities not available to public users.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
To leverage different brute forcing attacks, it's important to discover the type of authentication method used by the application, because the techniques and the tools to be used may change accordingly.&lt;br /&gt;
&lt;br /&gt;
=== Discovery Authentication Methods ===&lt;br /&gt;
&lt;br /&gt;
Unless an entity decides to apply a sophisticated web authentication, the two most commonly seen methods are as follows:&lt;br /&gt;
&lt;br /&gt;
* HTTP Authentication;&lt;br /&gt;
** Basic Access Authentication&lt;br /&gt;
** Digest Access Authentication&lt;br /&gt;
* HTML Form-based Authentication;&lt;br /&gt;
&lt;br /&gt;
The following sections provide some good information on identifying the authentication mechanism employed during a blackbox test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HTTP authentication'''&lt;br /&gt;
&lt;br /&gt;
There are two native HTTP access authentication schemes available to an organization – Basic and Digest. &lt;br /&gt;
&lt;br /&gt;
* Basic Access Authentication&lt;br /&gt;
&lt;br /&gt;
Basic Access Authentication assumes clients will identify themselves with a login name (e.g., &amp;quot;owasp&amp;quot;) and password (e.g., &amp;quot;password&amp;quot;). When the client browser initially accesses a site using this scheme, the web server will reply with a 401 response containing a “WWW-Authenticate” header, containing a value of “Basic” and the name of the protected realm (e.g., WWW-Authenticate: Basic realm=&amp;quot;wwwProtectedSite”). The client browser will then prompt the user for her login name and password for that realm. The client browser then responds to the web server with an “Authorization” header, containing the value “Basic” and the base64-encoded concatenation of the login name, a colon, and the password (e.g., Authorization: Basic b3dhc3A6cGFzc3dvcmQ=). Unfortunately, the authentication reply can be easily decoded should an attacker sniff the transmission.&lt;br /&gt;
&lt;br /&gt;
Request and Response Test:&lt;br /&gt;
&lt;br /&gt;
1. Client sends standard HTTP request for resource:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GET /members/docs/file.pdf HTTP/1.1&lt;br /&gt;
Host: target&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. The web server states that the requested resource is located in a protected directory.&lt;br /&gt;
&lt;br /&gt;
3. Server sends response with HTTP 401 Authorization Required:&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 401 Authorization Required&lt;br /&gt;
Date: Sat, 04 Nov 2006 12:52:40 GMT&lt;br /&gt;
WWW-Authenticate: Basic realm=&amp;quot;User Realm&amp;quot;&lt;br /&gt;
Content-Length: 401&lt;br /&gt;
Keep-Alive: timeout=15, max=100&lt;br /&gt;
Connection: Keep-Alive&lt;br /&gt;
Content-Type: text/html; charset=iso-8859-1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4. Browser displays challenge pop-up for username and password data entry.&lt;br /&gt;
&lt;br /&gt;
5. Client resubmits HTTP Request with credentials included:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GET /members/docs/file.pdf HTTP/1.1&lt;br /&gt;
Host: target&lt;br /&gt;
Authorization: Basic b3dhc3A6cGFzc3dvcmQ=&lt;br /&gt;
 &amp;lt;/pre&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
6. Server compares client information to its credentials list.&lt;br /&gt;
&lt;br /&gt;
7. If the credentials are valid, the server sends the requested content. If the authorization fails, the server resends HTTP status code 401. If the user clicks Cancel the browser will likely display an error message.&lt;br /&gt;
If an attacker is able to intercept the request from step 5, the string&lt;br /&gt;
&lt;br /&gt;
 b3dhc3A6cGFzc3dvcmQ= &lt;br /&gt;
could simply be base64 decoded as follows (Base64 Decoded): &lt;br /&gt;
 owasp:password&lt;br /&gt;
&lt;br /&gt;
If the tester is able to intercept the HTTP request of a basic authentication request, it is not necessary to apply brute-force techniques to uncover the credentials. Simply use a base64 decoder on the sniffed request.  However, if the tester is unable to intercept the HTTP request, the tester should use brute force tools.&lt;br /&gt;
&lt;br /&gt;
* Digest Access Authentication&lt;br /&gt;
&lt;br /&gt;
Digest Access Authentication expands upon the security of Basic Access Authentication by using a one-way cryptographic hashing algorithm (MD5) to encrypt authentication data and, secondly, adding a single use (connection unique) “nonce” value set by the web server. This value is used by the client browser in the calculation of a hashed password response. While the password is obscured by the use of the cryptographic hashing and the use of the nonce value precludes the threat of a replay attack, the login name is submitted in clear text.&lt;br /&gt;
&lt;br /&gt;
Request and Response Test:&lt;br /&gt;
&lt;br /&gt;
1. Here is an example of the initial Response header when handling an HTTP Digest target:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 401 Unauthorized&lt;br /&gt;
WWW-Authenticate: Digest realm=&amp;quot;OwaspSample&amp;quot;, &lt;br /&gt;
         nonce=&amp;quot;Ny8yLzIwMDIgMzoyNjoyNCBQTQ&amp;quot;, &lt;br /&gt;
         opaque=&amp;quot;0000000000000000&amp;quot;, \&lt;br /&gt;
         stale=false, &lt;br /&gt;
         algorithm=MD5, &lt;br /&gt;
         qop=&amp;quot;auth&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2. The Subsequent response headers with valid credentials would look like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GET /example/owasp/test.asmx HTTP/1.1&lt;br /&gt;
Accept: */*&lt;br /&gt;
Authorization:  Digest username=&amp;quot;owasp&amp;quot;, &lt;br /&gt;
        realm=&amp;quot;OwaspSample&amp;quot;, &lt;br /&gt;
        qop=&amp;quot;auth&amp;quot;, &lt;br /&gt;
        algorithm=&amp;quot;MD5&amp;quot;, &lt;br /&gt;
        uri=&amp;quot;/example/owasp/test.asmx&amp;quot;, &lt;br /&gt;
        nonce=&amp;quot;Ny8yLzIwMDIgMzoyNjoyNCBQTQ&amp;quot;, &lt;br /&gt;
        nc=00000001, &lt;br /&gt;
        cnonce=&amp;quot;c51b5139556f939768f770dab8e5277a&amp;quot;, &lt;br /&gt;
        opaque=&amp;quot;0000000000000000&amp;quot;, &lt;br /&gt;
        response=&amp;quot;2275a9ca7b2dadf252afc79923cd3823&amp;quot; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HTML Form-based Authentication'''&lt;br /&gt;
&lt;br /&gt;
While both HTTP access authentication schemes may appear suitable for commercial use over the Internet, particularly when used over an SSL encrypted session, many organizations have chosen to utilize custom HTML and application level authentication procedures, in order to provide a more sophisticated authentication procedure.&lt;br /&gt;
&lt;br /&gt;
Source code taken from a HTML form:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;form method=&amp;quot;POST&amp;quot; action=&amp;quot;login&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;input type=&amp;quot;text&amp;quot; name=&amp;quot;username&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;input type=&amp;quot;password&amp;quot; name=&amp;quot;password&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/form&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Brute force Attacks ===&lt;br /&gt;
&lt;br /&gt;
After having listed the different types of authentication methods for a web application, we will explain several types of brute force attacks. &lt;br /&gt;
&lt;br /&gt;
* Dictionary Attack&lt;br /&gt;
Dictionary-based attacks consist of automated scripts and tools that will try to guess usernames and passwords from a dictionary file. A dictionary file can be tuned and compiled to cover words probably used by the owner of the account that a malicious user is going to attack. The attacker can gather information (via active/passive reconnaissance, competitive intelligence, dumpster diving, social engineering) to understand the user, or build a list of all unique words available on the website. &lt;br /&gt;
&lt;br /&gt;
* Search Attacks&lt;br /&gt;
Search attacks will try to cover all possible combinations of a given character set and a given password length range. This kind of attack is very slow because the space of possible candidates is quite big. For example, given a known user ID, the total number of passwords to try, up to 8 characters in length, is equal to 26^(8) in a lower alpha charset (more than 200 billion possible passwords!). &lt;br /&gt;
&lt;br /&gt;
* Rule-based search attacks&lt;br /&gt;
To increase the combination space coverage without slowing too much of the process, it's suggested to create good rules to generate candidates. &lt;br /&gt;
For example, &amp;quot;John the Ripper&amp;quot; can generate password variations from part of the username or modify through a preconfigured mask words in the input (e.g., 1st round &amp;quot;pen&amp;quot; --&amp;gt; 2nd round &amp;quot;p3n&amp;quot; --&amp;gt; 3rd round &amp;quot;p3np3n&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
'''Bruteforcing HTTP Basic Authentication'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
raven@blackbox /hydra $ ./hydra -L users.txt -P words.txt www.site.com http-head /private/&lt;br /&gt;
Hydra v5.3 (c) 2006 by van Hauser / THC - use allowed only for legal purposes.&lt;br /&gt;
Hydra (http://www.thc.org) starting at 2009-07-04 18:15:17&lt;br /&gt;
[DATA] 16 tasks, 1 servers, 1638 login tries (l:2/p:819), ~102 tries per task&lt;br /&gt;
[DATA] attacking service http-head on port 80&lt;br /&gt;
[STATUS] 792.00 tries/min, 792 tries in 00:01h, 846 todo in 00:02h&lt;br /&gt;
[80][www] host: 10.0.0.1   login: owasp   password: password&lt;br /&gt;
[STATUS] attack finished for www.site.com (waiting for childs to finish)&lt;br /&gt;
Hydra (http://www.thc.org) finished at 2009-07-04 18:16:34&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Bruteforcing HTTP Digest Authentication'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
za@think/$ hydra -l zaki -P test.txt -vV localhost http-get /forbidden-d2&lt;br /&gt;
Hydra v6.5 (c) 2011 by van Hauser / THC and David Maciejak - use allowed only for legal purposes.&lt;br /&gt;
Hydra (http://www.thc.org/thc-hydra) starting at 2011-08-26 14:30:09&lt;br /&gt;
[VERBOSE] More tasks defined than login/pass pairs exist. Tasks reduced to 5.&lt;br /&gt;
[DATA] 5 tasks, 1 servers, 5 login tries (l:1/p:5), ~1 tries per task&lt;br /&gt;
[DATA] attacking service http-head on port 80&lt;br /&gt;
[VERBOSE] Resolving addresses ... done&lt;br /&gt;
&lt;br /&gt;
C:HEAD /~za/forbidden-d2 HTTP/1.0&lt;br /&gt;
Host: localhost&lt;br /&gt;
Authorization: Digest username=&amp;quot;zaki&amp;quot;, realm=&amp;quot;realm&amp;quot;, response=&amp;quot;f7cfc5844e0ca7fffdd38be2c89fccc5&amp;quot;, nonce=&amp;quot;vg/mg2OrBAA=544ece2e647da521b6adebed9b7cc678adff0bb7&amp;quot;, cnonce=&amp;quot;hydra&amp;quot;, nc=00000001, algorithm=MD5, qop=auth, uri=&amp;quot;/~za/forbidden-d2&amp;quot;&lt;br /&gt;
User-Agent: Mozilla/4.0 (Hydra)&lt;br /&gt;
&lt;br /&gt;
S:HTTP/1.1 301 Moved Permanently&lt;br /&gt;
Date: Fri, 26 Aug 2011 07:30:09 GMT&lt;br /&gt;
Server: Apache/2.2.16 (Ubuntu)&lt;br /&gt;
Location: http://localhost/~za/forbidden-d2/&lt;br /&gt;
Vary: Accept-Encoding&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=iso-8859-1&lt;br /&gt;
&lt;br /&gt;
A&lt;br /&gt;
[80][www] host: 127.0.0.1   login: zaki   password: zaki&lt;br /&gt;
Hydra (http://www.thc.org/thc-hydra) finished at 2011-08-26 14:30:09&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Bruteforcing HTML Form Based Authentication'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
raven@blackbox /hydra $ ./hydra -L users.txt -P words.txt www.site.com  https-post-form&lt;br /&gt;
 &amp;quot;/index.cgi:login&amp;amp;name=^USER^&amp;amp;password=^PASS^&amp;amp;login=Login:Not allowed&amp;quot; &amp;amp;&lt;br /&gt;
&lt;br /&gt;
Hydra v5.3 (c) 2006 by van Hauser / THC - use allowed only for legal purposes.&lt;br /&gt;
Hydra (http://www.thc.org)starting at 2009-07-04 19:16:17&lt;br /&gt;
[DATA] 16 tasks, 1 servers, 1638 login tries (l:2/p:819), ~102 tries per task&lt;br /&gt;
[DATA] attacking service http-post-form on port 443&lt;br /&gt;
[STATUS] attack finished for wiki.intranet (waiting for childs to finish)&lt;br /&gt;
[443] host: 10.0.0.1   login: owasp   password: password&lt;br /&gt;
[STATUS] attack finished for www.site.com (waiting for childs to finish)&lt;br /&gt;
Hydra (http://www.thc.org) finished at 2009-07-04 19:18:34&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
'''Partial knowledge of password and account details'''&lt;br /&gt;
&lt;br /&gt;
When a tester has some information about length or password (account) structure, it's possible to perform a bruteforce attack with a higher probability of success. In fact, by limiting the number of characters and defining the password length, the total number of password values significantly decreases.&lt;br /&gt;
&lt;br /&gt;
[[Image:bf-partialknowledge.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Memory Trade Off Attacks'''&lt;br /&gt;
&lt;br /&gt;
To perform a Memory Trade Off Attack, the tester needs at least a password hash previously obtained by the tester by exploiting flaws in the application (e.g., SQL Injection) or sniffing HTTP traffic. Nowadays, the most common attacks of this kind are based on Rainbow Tables, a special type of lookup table used in recovering the plaintext password from a ciphertext generated by a one-way hash.&lt;br /&gt;
&lt;br /&gt;
Rainbow tables are an optimization of Hellman's Memory Trade Off Attack, where the reduction algorithm is used to create chains with the purpose to compress the data output generated by computing all possible candidates.&lt;br /&gt;
&lt;br /&gt;
Tables are specific to the hash function they were created for, e.g., MD5 tables can only crack MD5 hashes. &lt;br /&gt;
The powerful RainbowCrack program was later developed that can generate and use rainbow tables for a variety of character sets and hashing algorithms, including LM hash, MD5, SHA1, etc.&lt;br /&gt;
&lt;br /&gt;
[[Image:bf-milworm.jpg]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Philippe Oechslin: Making a Faster Cryptanalytic Time-Memory Trade-Off - http://lasecwww.epfl.ch/pub/lasec/doc/Oech03.pdf&lt;br /&gt;
'''Links'''&amp;lt;br&amp;gt;&lt;br /&gt;
* OPHCRACK (the time-memory-trade-off-cracker) - http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/&lt;br /&gt;
* Project RainbowCrack - http://www.antsight.com/zsl/rainbowcrack/&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Bruter: http://sourceforge.net/projects/worawita/&lt;br /&gt;
* THC Hydra:        http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper:  http://www.openwall.com/john/&lt;br /&gt;
* Brutus: http://www.hoobie.net/brutus/&lt;br /&gt;
* Basic Auth Bruteforcer: https://market.android.com/details?id=com.firebird.basicauthbruteforcer&lt;br /&gt;
* Cain &amp;amp; Abel: http://www.oxid.it/cain.html&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working:&lt;br /&gt;
* milw0rm - http://www.milw0rm.com/cracker/list.php&lt;br /&gt;
* Rainbowcrack.com - http://www.rainbowcrack.com/&lt;br /&gt;
]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=131767</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=131767"/>
				<updated>2012-06-22T05:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://sites.google.com/a/owasp.org/landon/ Website]&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs to prank my friends and the occasional teacher. I discovered IRC in 4th grade and had a dedicated computer in my room connected to IRC at all times next to my TV. After that, I continued to be a “closet hacker”, all the way until recent years. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
landon . mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128313</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128313"/>
				<updated>2012-04-21T00:14:02Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://sites.google.com/a/owasp.org/landon/ Website]&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs to prank my friends and the occasional teacher. I discovered IRC in 4th grade and had a dedicated computer in my room connected to IRC at all times next to my TV. After that, I continued to be a “closet hacker”, all the way until recent years. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://techauthority.net/ Mind Map of OWASP.org]  '''(with direct links to ISOs, PDFs, and project pages)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
landon . mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128312</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128312"/>
				<updated>2012-04-21T00:09:04Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://sites.google.com/a/owasp.org/landon/ Website]&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs to prank my friends and the occasional teacher. I discovered IRC in 4th grade and had a dedicated computer in my room connected to IRC at all times next to my TV. From then on, I continued to be a “closet hacker” all the way until now. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://techauthority.net/ Mind Map of OWASP.org]  '''(with direct links to ISOs, PDFs, and project pages)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
landon . mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128311</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128311"/>
				<updated>2012-04-20T23:43:26Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://sites.google.com/a/owasp.org/landon/&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs that pissed off my teachers. I discovered IRC in 4th grade &lt;br /&gt;
and had a dedicated computer in my room connected to IRC at all times next to my TV. From then on, I continued to be a “closet hacker” all the way until now. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
One more thing, I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
landon . mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128310</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128310"/>
				<updated>2012-04-20T23:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://sites.google.com/a/owasp.org/landon/&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs that pissed off my teachers. I discovered IRC in 4th grade &lt;br /&gt;
and had a dedicated computer in my room connected to IRC at all times next to my TV. From then on, I continued to be a “closet hacker” all the way until now. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
One more thing, I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;br /&gt;
&lt;br /&gt;
landon[dot]mayo @ owasp . org&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128309</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128309"/>
				<updated>2012-04-20T23:40:16Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://sites.google.com/a/owasp.org/landon/&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. In 2nd grade, I wrote my first batch file. By 3rd grade I was writing autoexecs that pissed off my teachers. I discovered IRC in 4th grade &lt;br /&gt;
and had a dedicated computer in my room connected to IRC at all times next to my TV. From then on, I continued to be a “closet hacker” all the way until now. I never felt the need to prove anything to others or seek acceptance from anyone within the community. I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
One more thing, I’m no stranger to research and did a lot of it in college: I’m very objective and fact oriented. Results must be consistently reproducible, and embrace wrong hypothesizes as much as right ones. This is what makes research effective.&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128307</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128307"/>
				<updated>2012-04-20T23:34:30Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://sites.google.com/a/owasp.org/landon/&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was, and still is a computer genius. He currently works for Microsoft as a developer. &lt;br /&gt;
In 2nd grade, I wrote my first batch file.&lt;br /&gt;
By 3rd grade &lt;br /&gt;
I was writing autoexecs that pissed off my teachers. &lt;br /&gt;
I discovered IRC in 4th grade &lt;br /&gt;
and had a dedicated computer in my room connected to IRC at all times next to my TV. &lt;br /&gt;
From then on, I continued to be a “closet hacker”  all the way until now. &lt;br /&gt;
I never felt the need to prove anything to others or seek acceptance from anyone within the community.&lt;br /&gt;
I always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
One more thing, I’m no stranger to research and did a lot of it in college:&lt;br /&gt;
I’m very objective and fact oriented. &lt;br /&gt;
Results must be consistently reproducible&lt;br /&gt;
Embrace wrong hypothesizes as much as right ones, that’s what makes research effective.&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128303</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128303"/>
				<updated>2012-04-20T23:30:24Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: Added link to https://sites.google.com/a/owasp.org/landon/&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;https://sites.google.com/a/owasp.org/landon/&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was and still is a computer genius. He currently works for Microsoftas a developer. &lt;br /&gt;
In 2nd grade, I wrote my first batch file&lt;br /&gt;
By 3rd grade &lt;br /&gt;
I was writing autoexecs that pissed off my teachers. &lt;br /&gt;
Discovered IRC in 4th grade &lt;br /&gt;
Had a dedicated computer in my room connected to IRC at all times next to my TV &lt;br /&gt;
From then on,  continued to be a “closet hacker”  all the way until now. &lt;br /&gt;
Never felt the need to prove anything to others or seek acceptance from anyone within the community&lt;br /&gt;
Always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
One more thing, I’m no stranger to research and did a lot of it in college:&lt;br /&gt;
I’m very objective and fact oriented. &lt;br /&gt;
Results must be consistently reproducible&lt;br /&gt;
Embrace wrong hypothesizes as much as right ones, that’s what makes research effective.&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128302</id>
		<title>User:Landon Mayo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Landon_Mayo&amp;diff=128302"/>
				<updated>2012-04-20T23:27:58Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://sites.google.com/a/owasp.org/landon/]&lt;br /&gt;
&lt;br /&gt;
I am former Air Force, a pilot, and also have a medical background. My father, a pharmacist, owned his own pharmacy in the early 90s. He hired a delivery boy named Jared, who was and still is a computer genius. He currently works for Microsoftas a developer. &lt;br /&gt;
In 2nd grade, I wrote my first batch file&lt;br /&gt;
By 3rd grade &lt;br /&gt;
I was writing autoexecs that pissed off my teachers. &lt;br /&gt;
Discovered IRC in 4th grade &lt;br /&gt;
Had a dedicated computer in my room connected to IRC at all times next to my TV &lt;br /&gt;
From then on,  continued to be a “closet hacker”  all the way until now. &lt;br /&gt;
Never felt the need to prove anything to others or seek acceptance from anyone within the community&lt;br /&gt;
Always wanted to find answers by going to the source instead of superficial channels. &lt;br /&gt;
&lt;br /&gt;
One more thing, I’m no stranger to research and did a lot of it in college:&lt;br /&gt;
I’m very objective and fact oriented. &lt;br /&gt;
Results must be consistently reproducible&lt;br /&gt;
Embrace wrong hypothesizes as much as right ones, that’s what makes research effective.&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=The_Owasp_Code_Review_Top_9&amp;diff=124046</id>
		<title>The Owasp Code Review Top 9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=The_Owasp_Code_Review_Top_9&amp;diff=124046"/>
				<updated>2012-02-10T10:42:05Z</updated>
		
		<summary type="html">&lt;p&gt;Landon Mayo: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{LinkBar&lt;br /&gt;
  | useprev=PrevLink | prev=The Owasp Orizon Framework | lblprev=&lt;br /&gt;
  | usemain=MainLink | main=OWASP Code Review Guide Table of Contents | lblmain=Table of Contents&lt;br /&gt;
  | usenext=NextLink | next=The Owasp Code Review Scoring System | lblnext=&lt;br /&gt;
}}&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Preface ==&lt;br /&gt;
In this section, we will try to organize the most critical security flaws you can find during a code review in order to have a finite set of categories to evaluate the whole code review process.&lt;br /&gt;
&lt;br /&gt;
== The 9 Flaw Categories ==&lt;br /&gt;
In terms of source code security, source code vulnerabilities can be managed in a million ways. &lt;br /&gt;
&lt;br /&gt;
Source code vulnerabilities must reflect Owasp Top 10 recommendations. Applications are made of source code , so, in some way, source code flaws can be re conducted to flaws in application. &lt;br /&gt;
&lt;br /&gt;
The following family of categories are included as a default library in Owasp Orizon Project v1.0 that was released in October 2008. &lt;br /&gt;
&lt;br /&gt;
===The Nine Source Code Flaw Categories===&lt;br /&gt;
* Input validation&lt;br /&gt;
* Source code design&lt;br /&gt;
* Information leakage and improper error handling&lt;br /&gt;
* Direct object reference&lt;br /&gt;
* Resource usage&lt;br /&gt;
* API usage&lt;br /&gt;
* Best practices violation&lt;br /&gt;
* Weak Session Management&lt;br /&gt;
* Using HTTP GET query strings&lt;br /&gt;
&lt;br /&gt;
As you can see 3 categories out of 9 are equivalent to the corresponding  Owasp Top 10. &lt;br /&gt;
&lt;br /&gt;
Let's go more in detail, going deeper in describing the source code flaw categories. &lt;br /&gt;
&lt;br /&gt;
=== Input Validation ===&lt;br /&gt;
This flaw category is the source code counterpart of the Owasp Top 10 A1 category. &lt;br /&gt;
&lt;br /&gt;
This category contains the follow security flaw families: &lt;br /&gt;
Input validation &lt;br /&gt;
&lt;br /&gt;
Input validation&lt;br /&gt;
* Cross site scripting&lt;br /&gt;
* SQL Injection&lt;br /&gt;
* XPATH Injection&lt;br /&gt;
* LDAP Injection&lt;br /&gt;
* Cross site request forgery&lt;br /&gt;
* Buffer overflow&lt;br /&gt;
* Format bug&lt;br /&gt;
&lt;br /&gt;
=== Source Code Design ===&lt;br /&gt;
Security in source code starts from design, and from the choices made before starting to code. &lt;br /&gt;
&lt;br /&gt;
In the source code design flaw categories, you can find security check families tied to scope and source code organization. &lt;br /&gt;
&lt;br /&gt;
Source code design&lt;br /&gt;
* Insecure field scope&lt;br /&gt;
* Insecure method scope&lt;br /&gt;
* Insecure class modifiers&lt;br /&gt;
* Unused external references&lt;br /&gt;
* Redundant code&lt;br /&gt;
&lt;br /&gt;
=== Information leakage and improper error handling ===&lt;br /&gt;
This category meets the correspondent Owasp Top 10 one. It contains security check families about how source code manage errors, exception, logging and sensitive information. &lt;br /&gt;
&lt;br /&gt;
The following families are present: &lt;br /&gt;
&lt;br /&gt;
Information leakage and improper error handling &lt;br /&gt;
* Unhandled exception&lt;br /&gt;
* Routine return value usage&lt;br /&gt;
* NULL Pointer dereference&lt;br /&gt;
* Insecure logging&lt;br /&gt;
&lt;br /&gt;
=== Direct object reference ===&lt;br /&gt;
This category is the same as the one stated in the Owasp Top 10 project. It refers to the attacker's capability to interact with application internals supplying an ad hoc crafted parameter. &lt;br /&gt;
&lt;br /&gt;
The families contained in this category are: &lt;br /&gt;
&lt;br /&gt;
Direct object reference &lt;br /&gt;
* Direct reference to database data&lt;br /&gt;
* Direct reference to filesystem&lt;br /&gt;
* Direct reference to memory&lt;br /&gt;
&lt;br /&gt;
=== Resource usage ===&lt;br /&gt;
This category is related to all the unsafe ways a source code can request operating system managed resources. Most of the vulnerability families contained here, if exploited, will result in a some kind of denial of service. &lt;br /&gt;
&lt;br /&gt;
Resources can be:&lt;br /&gt;
* filesystem objects&lt;br /&gt;
* memory&lt;br /&gt;
* CPU&lt;br /&gt;
* network bandwidth&lt;br /&gt;
&lt;br /&gt;
The families included are: &lt;br /&gt;
Resource usage &lt;br /&gt;
* Insecure file creation&lt;br /&gt;
* Insecure file modifying&lt;br /&gt;
* Insecure file deletion&lt;br /&gt;
* Race condition&lt;br /&gt;
* Memory leak&lt;br /&gt;
* Unsafe process creation&lt;br /&gt;
&lt;br /&gt;
=== API usage ===&lt;br /&gt;
This section is about APIs provided by the system or by the framework in use that can be used in a malicious way. In this category you can find: &lt;br /&gt;
* insecure database calls&lt;br /&gt;
* insecure random number creation&lt;br /&gt;
* improper memory management calls&lt;br /&gt;
* insecure HTTP session handling&lt;br /&gt;
* insecure strings manipulation&lt;br /&gt;
&lt;br /&gt;
=== Best practices violation ===&lt;br /&gt;
This category is about all miscellaneous security violations that don’t fit in the previous categories. Most, but not all, of these contain warning-only source code best practices. &lt;br /&gt;
This category includes: &lt;br /&gt;
&lt;br /&gt;
* insecure memory pointer usage&lt;br /&gt;
* NULL pointer dereference&lt;br /&gt;
* pointer arithmetic&lt;br /&gt;
* variable aliasing&lt;br /&gt;
* unsafe variable initialization&lt;br /&gt;
* missing comments and source code documentation&lt;br /&gt;
&lt;br /&gt;
=== Weak Session Management ===&lt;br /&gt;
&lt;br /&gt;
* Not invalidating session upon an error occurring &lt;br /&gt;
* Not checking for valid sessions upon HTTP request &lt;br /&gt;
* Not issuing a new session upon successful authentication&lt;br /&gt;
* Passing cookies over non SSL connections (no secure flag)&lt;br /&gt;
&lt;br /&gt;
=== Using HTTP GET query strings ===&lt;br /&gt;
Payload data is logged if contained in query strings. This information can be logged in all nodes between client/browser and server. Passing sensitive information using a query string and HTTP GET is a mortal sin. SSL does not even protect you here.&lt;br /&gt;
&lt;br /&gt;
* Passing sensitive data over URL /querystring&lt;br /&gt;
&lt;br /&gt;
{{LinkBar&lt;br /&gt;
  | useprev=PrevLink | prev=The Owasp Orizon Framework | lblprev=&lt;br /&gt;
  | usemain=MainLink | main=OWASP Code Review Guide Table of Contents | lblmain=Table of Contents&lt;br /&gt;
  | usenext=NextLink | next=The Owasp Code Review Scoring System | lblnext=&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;/div&gt;</summary>
		<author><name>Landon Mayo</name></author>	</entry>

	</feed>