<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mcurphey</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mcurphey"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Mcurphey"/>
		<updated>2026-04-24T00:27:11Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Enterprise_Security_API&amp;diff=130445</id>
		<title>Category:OWASP Enterprise Security API</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Enterprise_Security_API&amp;diff=130445"/>
				<updated>2012-05-23T21:32:33Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Home  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.coraid.com Coraid], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Seattle&amp;diff=119196</id>
		<title>Seattle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Seattle&amp;diff=119196"/>
				<updated>2011-10-17T03:41:49Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Seattle|extra=The chapter leader is [mailto:mark@curphey.com Mark Curphey] ([http://www.twitter.com/curphey @curphey]). We meet monthly usually in downtown Seattle an manage our events using MeetUp. You must RSVP to attend meetings using [http://www.meetup.com/Seattle-Open-Web-Application-Security-Project-OWASP-Chapter/ Meetup]. The chapter has a Twitter account [http://www.twitter.com/owaspseattle @owaspseattle] for local and event news.&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-seattle|emailarchives=http://lists.owasp.org/pipermail/owasp-seattle}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting - November 17th, 2011 ==&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/Seattle-Open-Web-Application-Security-Project-OWASP-Chapter/events/37444702/ Register for this event]&lt;br /&gt;
&lt;br /&gt;
Talk : [http://blogs.adobe.com/asset/2011/04/nosql-but-even-less-security.html No SQL and even less security].&lt;br /&gt;
Speaker : Bryan Sullivan&lt;br /&gt;
&lt;br /&gt;
Location : &lt;br /&gt;
KPMG, Suite 900&lt;br /&gt;
801 second avenue&lt;br /&gt;
Seattle, WA&lt;br /&gt;
&lt;br /&gt;
Time : 6pm to 8pm&lt;br /&gt;
&lt;br /&gt;
To attend this meeting you must RSVP via the Meetup page due to limited spaces. &lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/Seattle-Open-Web-Application-Security-Project-OWASP-Chapter/events/37444702/ Register for this event]&lt;br /&gt;
&lt;br /&gt;
== December Meeting ==&lt;br /&gt;
&lt;br /&gt;
The December meeting is being scheduled now but will be help on December 15th at Googles offices in Freemont. &lt;br /&gt;
&lt;br /&gt;
==Past Events==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 11 August (Wednesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 8/11/2010 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
''Presentations:''&lt;br /&gt;
&lt;br /&gt;
'''How OWASP Works and Guided Tour of OWASP Projects'''&lt;br /&gt;
 &lt;br /&gt;
'''Speaker: Dinis Cruz'''&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on my experience in getting things done at OWASP, what resources are available and what types of initiatives should the local chapters be doing. In addition to a quick overview of a number of key OWASP projects, this talk will also provide a tutorial on how the OWASP WIKI (MediaWiki based) can be used as a database (using the MediaWiki templates technology)&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Using the O2 Platform to Consume OWASP projects'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Dinis Cruz'''&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on how to consume the OWASP Wiki and a number of OWASP projects using the OWASP O2 Platform. The O2 Platform has powerful technology and capabilities for both BlackBox and WhiteBox analysis and this presentation will provide examples on how to use O2 with: WebGoat, WebScarab, Code Crawler, Dir Buster,  Testing Guide, Code Review Guide and OpenSAMM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews (BlackBox + WhiteBox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP  projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides the Security Consultants a mechanism to: a) 'talk' with developers (via UnitTest) ,  b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and c) engage on a two-way conversion on the best way to fix/remediate those vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz''' is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&lt;br /&gt;
&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&lt;br /&gt;
&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers.&lt;br /&gt;
&lt;br /&gt;
Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences&lt;br /&gt;
&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project, member of the OWASP Global Projects Committee, chair of the OWASP Connections Committee and member of the OWASP Board&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 28 April (Wednesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 4/28/2010 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
''Presentations:''&lt;br /&gt;
&lt;br /&gt;
'''When Tools Are Not Enough – Best Practices for Securing Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' Walter Pearce &amp;amp; Wade Winright from IOActive&lt;br /&gt;
&lt;br /&gt;
The demands of regulatory compliance may have you looking to vulnerability scanning tools in the hopes of finding a silver bullet to examine your web applications. However, it is not realistic to expect scanners alone to accurately determine the impact of the web application vulnerabilities they detect. In this presentation, Walter Pearce and Wade Winright will discuss best practices for securing web applications, including how to effectively utilize tools in conjunction with penetration testing.&lt;br /&gt;
&lt;br /&gt;
'''Walter Pearce''' is a Senior Security Consultant at IOActive, experienced in enterprise-level application assessment and consultation. At IOActive he performs penetration testing, identifies system vulnerabilities, and designs custom security solutions for clients in software development, telecommunications, financial services, and professional services. Pearce has performed security assessments and IT security support services for many companies in the Fortune 100, including involvement in the largest existing penetration test of a major educational institution. He regularly leads IOActive training courses on numerous topics that include web application security, secure coding in C# or C++, and threat modeling.&lt;br /&gt;
&lt;br /&gt;
'''Wade Winright''' is a Security Consultant at IOActive, experienced in security testing, and network and systems installation and configuration. At IOActive he performs vulnerability and enterprise risk assessments of application, systems, and infrastructure, and designs custom security solutions for clients in software development, telecommunications, financial services, and professional services.&lt;br /&gt;
Winright is a SANS GIAC Certified Incident Handler with a focus on incident handling and hacker tools/techniques, and also is certified by the E-Commerce Council CEH, focused on vulnerability/penetration testing and countermeasures.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Protecting Your Applications from Backdoors:'''&lt;br /&gt;
&lt;br /&gt;
How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Clint Pollock from Veracode&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover;&lt;br /&gt;
Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Clint Pollock''' is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their online business risk. Clint's greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 3 February (Wednesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 2/3/2010 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker: Hidetake Jo'''&lt;br /&gt;
&lt;br /&gt;
'''Same Origin Policy'''&lt;br /&gt;
&lt;br /&gt;
'''Presentations:'''&lt;br /&gt;
&lt;br /&gt;
[[File:SameOriginPolicy.ppt]] - Same Origin Policy slide deck&lt;br /&gt;
&lt;br /&gt;
[[File:Rendezvous.ppt]] - Presentation on the Rendezvous toolset&lt;br /&gt;
&lt;br /&gt;
Same origin policy is a simple and important security policy which protects millions of users on the web.  Often times the policy is over simplified and there is a misconception that there is one consistent policy being used across all web technologies.  Unfortunately this can’t be further from the truth.  Different browser brands, RIA plugins, various scripting languages and features within the browser environment have their own interpretation of the same origin policy.  Not understanding the subtle differences can be catastrophic to web security.  This presentation tries to summarize the deltas in the same origin policy.  This is also a call for action to involve the community to more comprehensively document the policies. &lt;br /&gt;
&lt;br /&gt;
'''Hidetake Jo''' is part of the Trustworthy Computing team in Office.  He works with teams throughout Office to identify threats and ways to mitigate those threats, he also gets to break stuff.  Hidetake has written many penatration testing tools that are used throughout Microsoft.&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Pravir Chandra'''&lt;br /&gt;
&lt;br /&gt;
'''Open Software Assurance Maturity Model (OpenSAMM)'''&lt;br /&gt;
&lt;br /&gt;
'''Presentation:''' &lt;br /&gt;
&lt;br /&gt;
Slide deck can be found [http://www.opensamm.org/downloads/OpenSAMM-1.0.ppt here]&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
&lt;br /&gt;
'''Pravir Chandra''' is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.  &lt;br /&gt;
&lt;br /&gt;
=== Previous Event 11 August (Tuesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 8/11/2009 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Anil Kumar Revuru'''&lt;br /&gt;
&lt;br /&gt;
'''Slides: ''' [[file:Anti-XSS_3.0_RV.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''The Microsoft Anti-Cross-Site Scripting Library'''&lt;br /&gt;
&lt;br /&gt;
The Microsoft Anti-Cross-Site Scripting Library V3.0 (Anti-XSS V3.0) is an encoding library designed to help developers protect their ASP.NET web-based applications from XSS attacks. It differs from most encoding libraries in that it uses the white-listing technique — sometimes referred to as the principle of inclusions — to provide protection against XSS attacks.  This approach works by first defining a valid or allowable set of characters, and encodes anything outside this set (invalid characters or potential attacks).  The white listing approach provides several advantages over other encoding schemes. The following are some new features of Anti-XSS library v3.0.&lt;br /&gt;
* An expanded white list that supports more languages&lt;br /&gt;
*Performance improvements&lt;br /&gt;
*Performance data sheets (in the online help)&lt;br /&gt;
*Support for Shift_JIS encoding for mobile browsers&lt;br /&gt;
*Security Runtime Engine (SRE) HTTP module&lt;br /&gt;
*A sample application&lt;br /&gt;
 &lt;br /&gt;
In this session, we will learn in-depth how Anti-XSS works and learn more about its new features.&lt;br /&gt;
&lt;br /&gt;
'''Anil Kumar Revuru''' currently works for Information Security Tools team in Microsoft as Senior SDE where he is responsible for architecting security tools. In his previous life at Microsoft, Anil conducted security design reviews, threat modeling, and application and source-code assessments. He has authored security tools and has presented security courses internally at Microsoft. He excelled in his abilities by developing security tools such as Microsoft Threat Analysis and Modeling Tool and Anti-XSS Library. Anil holds a Diploma in Mechanical Engineering from JNTU Hyderabad. Anil displayed expert proficiency in the substantive and technical areas of design and development. Has keen interest in photography, xbox and computer hardware.&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Andre Gironda'''&lt;br /&gt;
&lt;br /&gt;
'''Using ASVS with the Code Review Guide, Testing Guide, and Time Management'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Verification Standards, which defines&lt;br /&gt;
four levels of web application security verification, lays down a&lt;br /&gt;
framework for security architecture review. While the ASVS includes&lt;br /&gt;
many requirements for controls, it does not suggest which tools,&lt;br /&gt;
techniques, timeline or methodologies to utilize. The OWASP Code&lt;br /&gt;
Review and Testing Guides provide the technical practices and suggest&lt;br /&gt;
or hint at tools, but also lack the timeline and methodology necessary&lt;br /&gt;
to complete an application penetration-test or SDLC integration&lt;br /&gt;
project for proper application security hygiene.&lt;br /&gt;
&lt;br /&gt;
This presentation will provide the 1000 foot view all the way down to&lt;br /&gt;
the nitty gritty details of how to perform ASVS activities using OWASP&lt;br /&gt;
resources, as well as some OWASP and non-OWASP tools (freeware or&lt;br /&gt;
demoware). Example timelines for typical ASVS activities, including&lt;br /&gt;
reports, will be discussed so that any sort of application security&lt;br /&gt;
project can be scoped properly, delivered on-time, and within budget.&lt;br /&gt;
&lt;br /&gt;
'''Andre Girond'''a is an application security specialist with a global&lt;br /&gt;
security consulting firm providing IT security services to the Fortune&lt;br /&gt;
500 and financial institutions as well as U.S. and foreign&lt;br /&gt;
governments. Prior to his current employment, Andre held a number of&lt;br /&gt;
payment application security positions in addition to working for the&lt;br /&gt;
largest online auction website. He is currently a leader for the Open&lt;br /&gt;
Web Application Security Project (OWASP), where he co-produces the&lt;br /&gt;
global OWASP News Podcast.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 28 April (Tuesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 4/28/2009&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Scott Stender'''&lt;br /&gt;
&lt;br /&gt;
'''Securing our Legacy - Responding to the call to provide practical security assurance'''&lt;br /&gt;
&lt;br /&gt;
Every few months witnesses the release of a much-hailed report from an industry organization, think tank, or government agency calling for the software that runs our critical infrastructure to be secured.   Making the call is easy, acting on it is only slightly harder, but succeeding at it is incredibly difficult.&lt;br /&gt;
 &lt;br /&gt;
Of all of the tasks that must be undertaken to truly meet the call, the single biggest challenge I have seen companies face is delivering security assurance on legacy code.  This talk will explore the challenge of providing security assurance for these old, little-loved, but heroic systems that power our lives.   More importantly, It will include guidance for software development managers and engineers seeking to gain insight into the operation of their legacy systems, mechanisms by which important security assertions can be gathered, and practical methods for carrying out penetration tests and code reviews with the aim of providing a high degree of security assurance.&lt;br /&gt;
 &lt;br /&gt;
Scott Stender is a co-founder and Partner of iSEC Partners, a strategic digital security organization. Scott brings with him several years of experience in large-scale software development and security consulting, having worked at  @stake and Microsoft in previous lives. &lt;br /&gt;
 &lt;br /&gt;
In his research, Scott focuses on secure software engineering methodology and analysis of core technologies. Scott has been published in publications such as IEEE Security &amp;amp; Privacy, and has presented at Microsoft Blue Hat and at Black Hat conferences on several occasions. Scott holds a BS in Computer Engineering from the University of Notre Dame.&lt;br /&gt;
-----------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Ashok Misra'''&lt;br /&gt;
&lt;br /&gt;
'''Application Issues with encryption of PANs'''&lt;br /&gt;
&lt;br /&gt;
There are unique application issues related to the storage and processing of credit card numbers for ecommerce transaction processing. This talk focuses on issues with the various cryptographic primitives used for PANs.&lt;br /&gt;
  &lt;br /&gt;
Ashok Misra is an Ecommerce professional with more than 10 years experience delivering results for leading ecommerce merchants.&lt;br /&gt;
 &lt;br /&gt;
He is currently Sr. Manager Payments &amp;amp; Security in the Media Applications Platform Development Division for e-Commerce products for Real Networks, Inc in Seattle, Washington. He brings an unusually comprehensive insight into security and payments processing.&lt;br /&gt;
 &lt;br /&gt;
Ashok is responsible for the Billing for Real’s Consumer Divisions. He takes a leadership role in identifying new opportunities in the consumer payments domain. He has extensive hands on experience in merchant integration with several leading payment providers.&lt;br /&gt;
 &lt;br /&gt;
Prior to working with Real Networks he built backend components for ecommerce for Amazon.com.&lt;br /&gt;
 &lt;br /&gt;
He has comprehensive domain knowledge in consumer payments over the internet with Credit Cards, EU Direct Debit , Real time Bank Transfers , Redirect Payment Instruments, Fraud Detection and PCI Compliance.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 23 October (Thursday) ===&lt;br /&gt;
&lt;br /&gt;
'''Location:''' 810 Third Avenue&lt;br /&gt;
&lt;br /&gt;
Seattle, WA 98104&lt;br /&gt;
&lt;br /&gt;
Conference room on the first floor &lt;br /&gt;
&lt;br /&gt;
'''Date:''' 10/23/2008&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6:30PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Michael Eddington'''&lt;br /&gt;
&lt;br /&gt;
'''Fuzzjacking!'''&lt;br /&gt;
&lt;br /&gt;
Fuzzing is one of the hot new buzzwords in the security industry and&lt;br /&gt;
if your clients had not already ask for it they will.  This talk will&lt;br /&gt;
introduce the subject, talk about different types of fuzzers,&lt;br /&gt;
integration into SDL, when to fuzz and also talk a bit about the Peach&lt;br /&gt;
Fuzzing Platform.  Questions and interaction requested :)&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Michael Eddington is a founding principal of Leviathan Security Group with over ten years&lt;br /&gt;
experience in computer security, with expertise in application and&lt;br /&gt;
network security, through threat modeling. Michael founded the&lt;br /&gt;
security services practice for IOActive and co-founded the Security&lt;br /&gt;
Services Center for Hewlett-Packard's services division. Michael is&lt;br /&gt;
also an accomplished software developer, having participated in a&lt;br /&gt;
number of open-source security development projects ranging from the&lt;br /&gt;
Trike threat modeling conceptual framework to the Peach Fuzzer&lt;br /&gt;
Platform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Chris Weber'''&lt;br /&gt;
&lt;br /&gt;
'''Exploiting Unicode-enabled Software'''&lt;br /&gt;
&lt;br /&gt;
This talk will showcase some of the ways that Unicode has been leveraged to cause software to break. We will survey the security issues outlined in Unicode Technical reports 36 and 39. The issues highlighted will be illustrated by examples of historical Unicode-related security flaws in popular software and Web applications. For each vulnerability we will assess the damage that was inflicted, describe how the exploit worked, and discuss the root cause. Examples will include demonstrations of how clever attackers can exploit Unicode-enabled software to run arbitrary code or takeover the machine.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Chris Weber co-founded Casaba Security who focuses on security testing for some of the world's leading software development companies and online properties. He has authored several security books, articles and presentations. He has worked as a security researcher and consultant for seven years and has identified hundreds of security vulnerabilities in many widely used software products&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 12 June (Thursday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
'''Date:''' 06/12/2008&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6:30PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Taylor McKinley'''&lt;br /&gt;
&lt;br /&gt;
'''Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking'''&lt;br /&gt;
&lt;br /&gt;
Dynamic taint propagation allows testers to find vulnerabilities without modifying existing functional tests. It enables true security testing inside a QA organization because it allows tight integration with existing QA infrastructure and solid usability for non-security experts. This talk will:&lt;br /&gt;
&lt;br /&gt;
*Explain how dynamic taint propagation works.&lt;br /&gt;
*Show how to retrofit an existing executable to perform dynamic taint propagation.&lt;br /&gt;
*Demonstrate how a tester can use a typical suite of functional tests to find vulnerabilities, without the need for malicious input or security expertise.&lt;br /&gt;
*Compare this approach with the effectiveness of popular penetration testing tools--particularly those acquired by IBM and HP in 2007--when deployed in a QA environment.&lt;br /&gt;
&lt;br /&gt;
The talk will conclude with a look towards the future of security testing in the QA environment and an overview of how multiple analysis techniques, both static and dynamic, can work together to provide better software assurance.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Taylor McKinley''', Product Manager, Fortify Software&lt;br /&gt;
&lt;br /&gt;
Mr. McKinley brings a rich business and technology background to Fortify Software, including strategic advisory roles at Morgan Stanley Dean Witter, New England Capital Partners and as a Principal at The Parthenon Group. Mr. McKinley has a BA from Williams College and an MBA from Stanford Business School.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Scott Stender'''&lt;br /&gt;
&lt;br /&gt;
'''Concurrency Attacks in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks are designed for developer productivity and performance. They are highly scalable, object-oriented, and can be used to create a usable web site in a matter of minutes.&lt;br /&gt;
&lt;br /&gt;
Highly parallelized, object-oriented web application frameworks encourage programming practices that make managing state difficult for a typical programmer. In order to have a web application that is robust in a multi-threaded environment, the developer must carefully manage access to all resources that can shared by threads. Global variables, session variables, database access, and back-end systems are common examples of such resources, not to mention application-specific resources.&lt;br /&gt;
&lt;br /&gt;
Concurrency flaws result when security-sensitive resources are not managed properly. As we have seen with almost every other prevalent class of security flaws, mistakes happen often when doing the right thing is difficult. To make things worse, concurrency flaws are often subtle and are identified only through difficult targeted testing.&lt;br /&gt;
&lt;br /&gt;
This presentation will provide brief technical background against this class of flaw and enumerate testing techniques that help identify when flaws are present.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Scott Stender''' is a founding partner of iSEC Partners, a strategic digital security organization. Scott brings with him several years of experience in large-scale software development and security consulting, having worked at companies such as @stake and Microsoft. Scott is a noted researcher who focuses on secure software engineering and security analysis of core technologies. He holds a BS in Computer Engineering from the University of Notre Dame.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 4 March (Tuesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
'''Date:''' 03/04/2008&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6:30PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Billy Rios'''&lt;br /&gt;
&lt;br /&gt;
'''Bad Sushi - Beating Phishers at Their Own Game'''&lt;br /&gt;
&lt;br /&gt;
This talk will expose tactics and tools used by phishers, show how easy it is to hack into servers that are used to perform phishing, demonstrate how easy it is so follow a phsisher's trail to find out how they share information on US Citizens including SSNs, bank account numbers, credit card numbers, ATM PINs, you name it.&lt;br /&gt;
&lt;br /&gt;
Phishers usually setup their sites on servers they have compromised. In other words, the phishers have already done the hard work and it is easy to gain access to these servers. Due to the sheer volume of sites that need to be setup to perform a successful phish, phishers tend to be sloppy and leave traces everywhere.&lt;br /&gt;
&lt;br /&gt;
This talk will expose some of the tactics and tools used by phishers. Actual walk-through of how compromised hosts were accessed to gain information about the phishers will be presented.&lt;br /&gt;
&lt;br /&gt;
This talk will also show how easy it is to construct a trail from a compromised host to obtain information about individuals that is spewed on hacker message boards located outside the United States.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Billy Rios''' lives in a phish bowl and is constantly being sent emails from acquaintances all over the world. Billy has won the Internet lotto several times, is expecting large sums of abandoned money from a long lost relative in the Congo, and has received checks accidentally made out for 30,000 instead of 30 US dollars.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Jon McClintock'''&lt;br /&gt;
&lt;br /&gt;
Session management is one of the most overlooked areas of web application security, and yet it can also be the most challenging feature to get right in your web application. This talk will provide a brief overview of web session management, followed by an exposition into how several common web application frameworks implement session management, finishing with a discussion of several classes of vulnerabilities that can arise through poor session management.&lt;br /&gt;
&lt;br /&gt;
'''Jon McClintock''' is a Senior Consultant for Leviathan Security Group, where he specializes in application security from design through implementation and into deployment. Prior to Leviathan, Jon was a Senior Software Engineer on Amazon.com's Information Security team, where he worked with software teams to define security requirements, assess application security, and educate developers about security software best practices.&lt;br /&gt;
&lt;br /&gt;
'''Date: 1/23/2008'''&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Waqas Nazir''', DigitSec&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/e/e9/Emerging_Threats_in_Distributed_Applications_%28Web_2%29.ppt presentation]&lt;br /&gt;
&lt;br /&gt;
Waqas Nazir has been working as an Information Security Consultant for clients such as Microsoft where he has delivered services in various arenas of information security. These include code reviews, black box assessments, product reviews, custom tools development for complex security problems, policy and process development. He has also worked with Microsoft Research (MSR) to develop a code analysis tool used for identifying areas of vulnerabilities in code. He has also been featured in Microsoft's Information Security Newsletter.&lt;br /&gt;
&lt;br /&gt;
Presentation Title: Emerging threats in Web 2.0&lt;br /&gt;
&lt;br /&gt;
Web 2.0 applications provide many rich features today such as hosting third party RSS Feeds, hosting third party web pages, translation services, and cross domain communication. While these rich features provide great functionality to end users, they can have serious security implications if not designed properly. Moreover, implementation flaws plague many of these features. This presentation will focus on some new emerging threats to Web 2.0 applications from a design and implementation perspective, leaving out the often covered Web 2.0 Vulnerabilities (Ajax, XSRF, etc).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Chris Clark''', iSEC Partners&lt;br /&gt;
&lt;br /&gt;
Chris Clark is a Senior Security Consultant at iSEC Partners, Inc. He possesses several years of experience in secure application design, penetration testing, and security process management. Most recently Chris worked for Microsoft performing security analysis and verification on enterprise management software and was previously responsible for the security of a web-based payment platform processing over 20 million credit card transactions per day. Chris has extensive experience in developing and delivering security trainings for large organizations, software engineering utilizing Win32 and the .Net Framework, and analyzing threats to large scale distributed systems. At Microsoft, Chris was responsible for the coordination of multiple product groups following the Microsoft Secure Development Lifecycle.&lt;br /&gt;
&lt;br /&gt;
Presentation Title: Ruby on Rails Security&lt;br /&gt;
&lt;br /&gt;
Ruby on Rails has been hailed for its ability to increase developer productivity by making web development easier.  Though Ruby on Rails may help developers create sites more quickly, it is no more immune to security threats than other web development frameworks.  Chris Clark will present the means by which the OWASP Top Ten manifest themselves in a Ruby on Rails environment, provide best practices for preventing these attacks, and discuss his ongoing research in Ruby-specific security concerns.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11/29/2007 @ 6:30PM PST - Seattle chapter meeting&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
'''Date:''' 11/29/2007&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Tom Gallagher''' has been intrigued with both physical and computer security from a young age. He is currently the lead of the Microsoft Office Security Test team. This team is primarily focused on penetration testing, writing security testing tools, and educating program managers, developers, and testers about security issues. Tom recently co-authored the MSPress title &amp;quot;Hunting Security Bugs&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Presentation Title: Hunting security bugs in your code&lt;br /&gt;
&lt;br /&gt;
Description: Finding security bugs is often regarded as an activity requiring secret powers or extremely specialized knowledge.  Some security bugs are difficult to uncover and require deep knowledge.  However, with basic knowledge many areas can be tested without much effort.  This presentation will show how to perform basic security testing using simple tools and the difference in effort between finding a bug and exploiting it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''David E Stevens III''', Senior ROI Analyst, Symplified Inc.&lt;br /&gt;
&lt;br /&gt;
In 2006, Symplified recruited Stevens for his expertise and ability to clearly explain concepts like Return On Investment (ROI) and Total Cost of Ownership (TCO). Over the past 5 years Stevens has given dozens of presentations regarding ROI, and is a confident and charismatic speaker. Stevens is touring the U.S. representing Symplified and teaching how ROI can be applied to security and Identity investments to technical security user groups.&lt;br /&gt;
&lt;br /&gt;
Synopsis of &amp;quot;Understanding ROI, TCO and other key financial aspects of IT Security&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In this presentation, Stevens teaches how security and IT professionals can obtain financing for important security initiatives using accounting principles such as Return On Investment (ROI) and Total Cost of Ownership (TCO). In this 30-minute presentation, the group learns what these terms mean and how they can be used to show the value of security software purchases. He concludes by sharing other tips on how the technology professional can better communicate with their business counterparts. This non-sales presentation is intended to equip attendees with useful tools that articulate the benefits of investing in IT security. Learn from Symplified's more than 30 years combined experience in Identity Management at hundreds of Fortune 500 organizations worldwide. Attendees receive a useful ROI calculator for IDM investments. This is a must attend presentation for anyone who has ever had trouble getting the funding they needed for a security software investment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09/06/2007 @ 6PM PST - Seattle chapter meeting&lt;br /&gt;
&lt;br /&gt;
'''Details:'''&lt;br /&gt;
Location: &lt;br /&gt;
Bellevue Las Margaritas &lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
Time: 6 o'clock&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
* '''Rob Rachwald''' - Rob is a 10-year veteran of the high tech industry.  Rob started his tech career at Intel, where he worked on automating their complex supply chain.  Rob managed US product marketing for Commerce One and managed their marketing efforts in Asia Pacific. Rob, then, managed marketing for Coverity and joined Fortify as the Director of Product Marketing focusing on security and financial services. &lt;br /&gt;
** Online Banking - Abstract: Banks, often the biggest target of cyber attacks, have set an example for responsible security strategies.  How do the world's leading financial institutions balance risk against the pressures of delivering software to customers quickly?  How are developers trained to write code securely?  How are software security tools, such as dynamic and static analysis, deployed for optimal use?&lt;br /&gt;
* '''Damon Cortesi''' - Damon has worked in network and application security risk management for nearly a decade, beginning with his work as Systems and Security Administrator at his alma mater.  Following school, he entered the professional arena as an Information Security Consultant for one of the top 10 CPA firms serving financial institutions including banks, credit unions, and event the major credit reporting bureaus.  Most recently at IOActive, Mr. Cortesi has been serving the specialized needs of top technology companies in addition to standard penetration testing, web application security assessments, source code reviews, and PCI assessments.&lt;br /&gt;
** Web Hacking 101 introduces the basic concepts of web application security including SQL Injection, Cross-Site Scripting (XSS), and typical application logic flaws found in an ASP-based web application. These concepts are then put to use in a live demonstration that illustrates the all-too-common ways of attacking a web application and gaining unauthorized access to sensitive information or restricted areas of a website.  Demos will included manual SQL Injection techniques as well as the use of free/open-source tools used to expedite the extraction process, examples of both reflected and stored XSS that can be used to elevate the privileges of a user, and standard authorization bypass issues that developers often ignore.  Finally, basic mitigation techniques will be discussed that can be put into place by developers to prevent these common hacking techniques.&lt;br /&gt;
&lt;br /&gt;
''' Update: ''' - Rob's slides can be downloaded from [http://www.owasp.org/images/f/f6/SANS_Online_Banking_Case_study.ppt here].&lt;br /&gt;
''' Update #2: ''' - Damon's slides can be found [https://www.owasp.org/images/3/32/Web_Hacking_101.pdf here].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
2/28/2007 @ 6PM PST - Seattle chapter meeting&lt;br /&gt;
&lt;br /&gt;
'''Details:'''&lt;br /&gt;
&lt;br /&gt;
Location: Bellevue Las Margaritas (http://www.lasmargaritasbellevue.com/)&lt;br /&gt;
&lt;br /&gt;
Time: 6 o’clock. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
* '''Dinis Cruz (Chief OWASP Evangelist)''' - Directly from London, Dinis will be doing two presentations at this event:&lt;br /&gt;
** '''Buffer Overflows on .Net and Asp.Net''' - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
** '''OWASP, the Open Web Application Security Project''' - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
** '''0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
&lt;br /&gt;
* '''Brad Hill (Senior Security Consultant with iSEC Partners)''',  will be speaking on:&lt;br /&gt;
** '''XML Digital Signature and Encryption: Use and Abuse''' - The WS-Security set of standards is on the threshold of ubiquitous deployment and XML applications have already taken over the world. This presentation looks at two underlying technologies, XML Digital Signature (XMLDSIG) and XML Encryption (XMLENC), their place in the Web Services stack and their applicability to non-SOAP XML applications. Beginning with a basic overview of the standards, we will uncover some surprising caveats and risks in the use of these technologies.&lt;br /&gt;
&lt;br /&gt;
=== Previous Meeting 8 January 2007===&lt;br /&gt;
1/8/2007 @ 6 o'clock - Seattle chapter meeting.  &lt;br /&gt;
&lt;br /&gt;
'''Details:''' Location: Bellevue Las Margaritas (http://www.lasmargaritasbellevue.com/)&lt;br /&gt;
Time: 6 o’clock. &lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
Ward Spagenberg of IOActive on the topic &amp;quot;Unraveling PCI&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Since there will be free food, beer and pop please let Mike de Libero know so we know how much to order.&lt;br /&gt;
We look forward to seeing you all there!&lt;br /&gt;
&lt;br /&gt;
[[Category:Washington]]&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Seattle&amp;diff=119195</id>
		<title>Seattle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Seattle&amp;diff=119195"/>
				<updated>2011-10-17T03:39:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Seattle|extra=The chapter leader is [mailto:mark@curphey.com Mark Curphey] ([http://www.twitter.com/curphey @curphey]). We meet monthly usually in downtown Seattle an manage our events using MeetUp. You must RSVP to attend meetings using [http://www.meetup.com/Seattle-Open-Web-Application-Security-Project-OWASP-Chapter/ Meetup]. The chapter has a Twitter account [http://www.twitter.com/owaspseattle @owaspseattle] for local and event news.&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-seattle|emailarchives=http://lists.owasp.org/pipermail/owasp-seattle}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting - November 17th, 2011 ==&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/Seattle-Open-Web-Application-Security-Project-OWASP-Chapter/events/37444702/ Register for this event]&lt;br /&gt;
&lt;br /&gt;
Talk : [http://blogs.adobe.com/asset/2011/04/nosql-but-even-less-security.html No SQL and even less security].&lt;br /&gt;
Speaker : Bryan Sullivan&lt;br /&gt;
&lt;br /&gt;
Location : &lt;br /&gt;
KPMG, Suite 900&lt;br /&gt;
801 second avenue&lt;br /&gt;
Seattle, WA&lt;br /&gt;
&lt;br /&gt;
Time : 6pm to 8pm&lt;br /&gt;
&lt;br /&gt;
To attend this meeting you must RSVP via the Meetup page due to limited spaces. &lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/Seattle-Open-Web-Application-Security-Project-OWASP-Chapter/events/37444702/ Register for this event]&lt;br /&gt;
&lt;br /&gt;
== December Meeting is Being Scheduled Now ==&lt;br /&gt;
&lt;br /&gt;
==Past Events==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 11 August (Wednesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 8/11/2010 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
''Presentations:''&lt;br /&gt;
&lt;br /&gt;
'''How OWASP Works and Guided Tour of OWASP Projects'''&lt;br /&gt;
 &lt;br /&gt;
'''Speaker: Dinis Cruz'''&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on my experience in getting things done at OWASP, what resources are available and what types of initiatives should the local chapters be doing. In addition to a quick overview of a number of key OWASP projects, this talk will also provide a tutorial on how the OWASP WIKI (MediaWiki based) can be used as a database (using the MediaWiki templates technology)&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Using the O2 Platform to Consume OWASP projects'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Dinis Cruz'''&lt;br /&gt;
&lt;br /&gt;
This presentation will focus on how to consume the OWASP Wiki and a number of OWASP projects using the OWASP O2 Platform. The O2 Platform has powerful technology and capabilities for both BlackBox and WhiteBox analysis and this presentation will provide examples on how to use O2 with: WebGoat, WebScarab, Code Crawler, Dir Buster,  Testing Guide, Code Review Guide and OpenSAMM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough 'source-code-driven' application security reviews (BlackBox + WhiteBox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP  projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides the Security Consultants a mechanism to: a) 'talk' with developers (via UnitTest) ,  b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and c) engage on a two-way conversion on the best way to fix/remediate those vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz''' is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&lt;br /&gt;
&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&lt;br /&gt;
&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers.&lt;br /&gt;
&lt;br /&gt;
Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences&lt;br /&gt;
&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project, member of the OWASP Global Projects Committee, chair of the OWASP Connections Committee and member of the OWASP Board&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 28 April (Wednesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 4/28/2010 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
''Presentations:''&lt;br /&gt;
&lt;br /&gt;
'''When Tools Are Not Enough – Best Practices for Securing Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' Walter Pearce &amp;amp; Wade Winright from IOActive&lt;br /&gt;
&lt;br /&gt;
The demands of regulatory compliance may have you looking to vulnerability scanning tools in the hopes of finding a silver bullet to examine your web applications. However, it is not realistic to expect scanners alone to accurately determine the impact of the web application vulnerabilities they detect. In this presentation, Walter Pearce and Wade Winright will discuss best practices for securing web applications, including how to effectively utilize tools in conjunction with penetration testing.&lt;br /&gt;
&lt;br /&gt;
'''Walter Pearce''' is a Senior Security Consultant at IOActive, experienced in enterprise-level application assessment and consultation. At IOActive he performs penetration testing, identifies system vulnerabilities, and designs custom security solutions for clients in software development, telecommunications, financial services, and professional services. Pearce has performed security assessments and IT security support services for many companies in the Fortune 100, including involvement in the largest existing penetration test of a major educational institution. He regularly leads IOActive training courses on numerous topics that include web application security, secure coding in C# or C++, and threat modeling.&lt;br /&gt;
&lt;br /&gt;
'''Wade Winright''' is a Security Consultant at IOActive, experienced in security testing, and network and systems installation and configuration. At IOActive he performs vulnerability and enterprise risk assessments of application, systems, and infrastructure, and designs custom security solutions for clients in software development, telecommunications, financial services, and professional services.&lt;br /&gt;
Winright is a SANS GIAC Certified Incident Handler with a focus on incident handling and hacker tools/techniques, and also is certified by the E-Commerce Council CEH, focused on vulnerability/penetration testing and countermeasures.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Protecting Your Applications from Backdoors:'''&lt;br /&gt;
&lt;br /&gt;
How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Clint Pollock from Veracode&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. In this session we will cover;&lt;br /&gt;
Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Clint Pollock''' is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their online business risk. Clint's greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 3 February (Wednesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 2/3/2010 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker: Hidetake Jo'''&lt;br /&gt;
&lt;br /&gt;
'''Same Origin Policy'''&lt;br /&gt;
&lt;br /&gt;
'''Presentations:'''&lt;br /&gt;
&lt;br /&gt;
[[File:SameOriginPolicy.ppt]] - Same Origin Policy slide deck&lt;br /&gt;
&lt;br /&gt;
[[File:Rendezvous.ppt]] - Presentation on the Rendezvous toolset&lt;br /&gt;
&lt;br /&gt;
Same origin policy is a simple and important security policy which protects millions of users on the web.  Often times the policy is over simplified and there is a misconception that there is one consistent policy being used across all web technologies.  Unfortunately this can’t be further from the truth.  Different browser brands, RIA plugins, various scripting languages and features within the browser environment have their own interpretation of the same origin policy.  Not understanding the subtle differences can be catastrophic to web security.  This presentation tries to summarize the deltas in the same origin policy.  This is also a call for action to involve the community to more comprehensively document the policies. &lt;br /&gt;
&lt;br /&gt;
'''Hidetake Jo''' is part of the Trustworthy Computing team in Office.  He works with teams throughout Office to identify threats and ways to mitigate those threats, he also gets to break stuff.  Hidetake has written many penatration testing tools that are used throughout Microsoft.&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Pravir Chandra'''&lt;br /&gt;
&lt;br /&gt;
'''Open Software Assurance Maturity Model (OpenSAMM)'''&lt;br /&gt;
&lt;br /&gt;
'''Presentation:''' &lt;br /&gt;
&lt;br /&gt;
Slide deck can be found [http://www.opensamm.org/downloads/OpenSAMM-1.0.ppt here]&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
&lt;br /&gt;
'''Pravir Chandra''' is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.  &lt;br /&gt;
&lt;br /&gt;
=== Previous Event 11 August (Tuesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 8/11/2009 @ 6:30ish&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Anil Kumar Revuru'''&lt;br /&gt;
&lt;br /&gt;
'''Slides: ''' [[file:Anti-XSS_3.0_RV.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''The Microsoft Anti-Cross-Site Scripting Library'''&lt;br /&gt;
&lt;br /&gt;
The Microsoft Anti-Cross-Site Scripting Library V3.0 (Anti-XSS V3.0) is an encoding library designed to help developers protect their ASP.NET web-based applications from XSS attacks. It differs from most encoding libraries in that it uses the white-listing technique — sometimes referred to as the principle of inclusions — to provide protection against XSS attacks.  This approach works by first defining a valid or allowable set of characters, and encodes anything outside this set (invalid characters or potential attacks).  The white listing approach provides several advantages over other encoding schemes. The following are some new features of Anti-XSS library v3.0.&lt;br /&gt;
* An expanded white list that supports more languages&lt;br /&gt;
*Performance improvements&lt;br /&gt;
*Performance data sheets (in the online help)&lt;br /&gt;
*Support for Shift_JIS encoding for mobile browsers&lt;br /&gt;
*Security Runtime Engine (SRE) HTTP module&lt;br /&gt;
*A sample application&lt;br /&gt;
 &lt;br /&gt;
In this session, we will learn in-depth how Anti-XSS works and learn more about its new features.&lt;br /&gt;
&lt;br /&gt;
'''Anil Kumar Revuru''' currently works for Information Security Tools team in Microsoft as Senior SDE where he is responsible for architecting security tools. In his previous life at Microsoft, Anil conducted security design reviews, threat modeling, and application and source-code assessments. He has authored security tools and has presented security courses internally at Microsoft. He excelled in his abilities by developing security tools such as Microsoft Threat Analysis and Modeling Tool and Anti-XSS Library. Anil holds a Diploma in Mechanical Engineering from JNTU Hyderabad. Anil displayed expert proficiency in the substantive and technical areas of design and development. Has keen interest in photography, xbox and computer hardware.&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Andre Gironda'''&lt;br /&gt;
&lt;br /&gt;
'''Using ASVS with the Code Review Guide, Testing Guide, and Time Management'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Application Security Verification Standards, which defines&lt;br /&gt;
four levels of web application security verification, lays down a&lt;br /&gt;
framework for security architecture review. While the ASVS includes&lt;br /&gt;
many requirements for controls, it does not suggest which tools,&lt;br /&gt;
techniques, timeline or methodologies to utilize. The OWASP Code&lt;br /&gt;
Review and Testing Guides provide the technical practices and suggest&lt;br /&gt;
or hint at tools, but also lack the timeline and methodology necessary&lt;br /&gt;
to complete an application penetration-test or SDLC integration&lt;br /&gt;
project for proper application security hygiene.&lt;br /&gt;
&lt;br /&gt;
This presentation will provide the 1000 foot view all the way down to&lt;br /&gt;
the nitty gritty details of how to perform ASVS activities using OWASP&lt;br /&gt;
resources, as well as some OWASP and non-OWASP tools (freeware or&lt;br /&gt;
demoware). Example timelines for typical ASVS activities, including&lt;br /&gt;
reports, will be discussed so that any sort of application security&lt;br /&gt;
project can be scoped properly, delivered on-time, and within budget.&lt;br /&gt;
&lt;br /&gt;
'''Andre Girond'''a is an application security specialist with a global&lt;br /&gt;
security consulting firm providing IT security services to the Fortune&lt;br /&gt;
500 and financial institutions as well as U.S. and foreign&lt;br /&gt;
governments. Prior to his current employment, Andre held a number of&lt;br /&gt;
payment application security positions in addition to working for the&lt;br /&gt;
largest online auction website. He is currently a leader for the Open&lt;br /&gt;
Web Application Security Project (OWASP), where he co-produces the&lt;br /&gt;
global OWASP News Podcast.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 28 April (Tuesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 4/28/2009&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Scott Stender'''&lt;br /&gt;
&lt;br /&gt;
'''Securing our Legacy - Responding to the call to provide practical security assurance'''&lt;br /&gt;
&lt;br /&gt;
Every few months witnesses the release of a much-hailed report from an industry organization, think tank, or government agency calling for the software that runs our critical infrastructure to be secured.   Making the call is easy, acting on it is only slightly harder, but succeeding at it is incredibly difficult.&lt;br /&gt;
 &lt;br /&gt;
Of all of the tasks that must be undertaken to truly meet the call, the single biggest challenge I have seen companies face is delivering security assurance on legacy code.  This talk will explore the challenge of providing security assurance for these old, little-loved, but heroic systems that power our lives.   More importantly, It will include guidance for software development managers and engineers seeking to gain insight into the operation of their legacy systems, mechanisms by which important security assertions can be gathered, and practical methods for carrying out penetration tests and code reviews with the aim of providing a high degree of security assurance.&lt;br /&gt;
 &lt;br /&gt;
Scott Stender is a co-founder and Partner of iSEC Partners, a strategic digital security organization. Scott brings with him several years of experience in large-scale software development and security consulting, having worked at  @stake and Microsoft in previous lives. &lt;br /&gt;
 &lt;br /&gt;
In his research, Scott focuses on secure software engineering methodology and analysis of core technologies. Scott has been published in publications such as IEEE Security &amp;amp; Privacy, and has presented at Microsoft Blue Hat and at Black Hat conferences on several occasions. Scott holds a BS in Computer Engineering from the University of Notre Dame.&lt;br /&gt;
-----------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Ashok Misra'''&lt;br /&gt;
&lt;br /&gt;
'''Application Issues with encryption of PANs'''&lt;br /&gt;
&lt;br /&gt;
There are unique application issues related to the storage and processing of credit card numbers for ecommerce transaction processing. This talk focuses on issues with the various cryptographic primitives used for PANs.&lt;br /&gt;
  &lt;br /&gt;
Ashok Misra is an Ecommerce professional with more than 10 years experience delivering results for leading ecommerce merchants.&lt;br /&gt;
 &lt;br /&gt;
He is currently Sr. Manager Payments &amp;amp; Security in the Media Applications Platform Development Division for e-Commerce products for Real Networks, Inc in Seattle, Washington. He brings an unusually comprehensive insight into security and payments processing.&lt;br /&gt;
 &lt;br /&gt;
Ashok is responsible for the Billing for Real’s Consumer Divisions. He takes a leadership role in identifying new opportunities in the consumer payments domain. He has extensive hands on experience in merchant integration with several leading payment providers.&lt;br /&gt;
 &lt;br /&gt;
Prior to working with Real Networks he built backend components for ecommerce for Amazon.com.&lt;br /&gt;
 &lt;br /&gt;
He has comprehensive domain knowledge in consumer payments over the internet with Credit Cards, EU Direct Debit , Real time Bank Transfers , Redirect Payment Instruments, Fraud Detection and PCI Compliance.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 23 October (Thursday) ===&lt;br /&gt;
&lt;br /&gt;
'''Location:''' 810 Third Avenue&lt;br /&gt;
&lt;br /&gt;
Seattle, WA 98104&lt;br /&gt;
&lt;br /&gt;
Conference room on the first floor &lt;br /&gt;
&lt;br /&gt;
'''Date:''' 10/23/2008&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6:30PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Michael Eddington'''&lt;br /&gt;
&lt;br /&gt;
'''Fuzzjacking!'''&lt;br /&gt;
&lt;br /&gt;
Fuzzing is one of the hot new buzzwords in the security industry and&lt;br /&gt;
if your clients had not already ask for it they will.  This talk will&lt;br /&gt;
introduce the subject, talk about different types of fuzzers,&lt;br /&gt;
integration into SDL, when to fuzz and also talk a bit about the Peach&lt;br /&gt;
Fuzzing Platform.  Questions and interaction requested :)&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Michael Eddington is a founding principal of Leviathan Security Group with over ten years&lt;br /&gt;
experience in computer security, with expertise in application and&lt;br /&gt;
network security, through threat modeling. Michael founded the&lt;br /&gt;
security services practice for IOActive and co-founded the Security&lt;br /&gt;
Services Center for Hewlett-Packard's services division. Michael is&lt;br /&gt;
also an accomplished software developer, having participated in a&lt;br /&gt;
number of open-source security development projects ranging from the&lt;br /&gt;
Trike threat modeling conceptual framework to the Peach Fuzzer&lt;br /&gt;
Platform.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Chris Weber'''&lt;br /&gt;
&lt;br /&gt;
'''Exploiting Unicode-enabled Software'''&lt;br /&gt;
&lt;br /&gt;
This talk will showcase some of the ways that Unicode has been leveraged to cause software to break. We will survey the security issues outlined in Unicode Technical reports 36 and 39. The issues highlighted will be illustrated by examples of historical Unicode-related security flaws in popular software and Web applications. For each vulnerability we will assess the damage that was inflicted, describe how the exploit worked, and discuss the root cause. Examples will include demonstrations of how clever attackers can exploit Unicode-enabled software to run arbitrary code or takeover the machine.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Chris Weber co-founded Casaba Security who focuses on security testing for some of the world's leading software development companies and online properties. He has authored several security books, articles and presentations. He has worked as a security researcher and consultant for seven years and has identified hundreds of security vulnerabilities in many widely used software products&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 12 June (Thursday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
'''Date:''' 06/12/2008&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6:30PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Taylor McKinley'''&lt;br /&gt;
&lt;br /&gt;
'''Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking'''&lt;br /&gt;
&lt;br /&gt;
Dynamic taint propagation allows testers to find vulnerabilities without modifying existing functional tests. It enables true security testing inside a QA organization because it allows tight integration with existing QA infrastructure and solid usability for non-security experts. This talk will:&lt;br /&gt;
&lt;br /&gt;
*Explain how dynamic taint propagation works.&lt;br /&gt;
*Show how to retrofit an existing executable to perform dynamic taint propagation.&lt;br /&gt;
*Demonstrate how a tester can use a typical suite of functional tests to find vulnerabilities, without the need for malicious input or security expertise.&lt;br /&gt;
*Compare this approach with the effectiveness of popular penetration testing tools--particularly those acquired by IBM and HP in 2007--when deployed in a QA environment.&lt;br /&gt;
&lt;br /&gt;
The talk will conclude with a look towards the future of security testing in the QA environment and an overview of how multiple analysis techniques, both static and dynamic, can work together to provide better software assurance.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Taylor McKinley''', Product Manager, Fortify Software&lt;br /&gt;
&lt;br /&gt;
Mr. McKinley brings a rich business and technology background to Fortify Software, including strategic advisory roles at Morgan Stanley Dean Witter, New England Capital Partners and as a Principal at The Parthenon Group. Mr. McKinley has a BA from Williams College and an MBA from Stanford Business School.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Scott Stender'''&lt;br /&gt;
&lt;br /&gt;
'''Concurrency Attacks in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks are designed for developer productivity and performance. They are highly scalable, object-oriented, and can be used to create a usable web site in a matter of minutes.&lt;br /&gt;
&lt;br /&gt;
Highly parallelized, object-oriented web application frameworks encourage programming practices that make managing state difficult for a typical programmer. In order to have a web application that is robust in a multi-threaded environment, the developer must carefully manage access to all resources that can shared by threads. Global variables, session variables, database access, and back-end systems are common examples of such resources, not to mention application-specific resources.&lt;br /&gt;
&lt;br /&gt;
Concurrency flaws result when security-sensitive resources are not managed properly. As we have seen with almost every other prevalent class of security flaws, mistakes happen often when doing the right thing is difficult. To make things worse, concurrency flaws are often subtle and are identified only through difficult targeted testing.&lt;br /&gt;
&lt;br /&gt;
This presentation will provide brief technical background against this class of flaw and enumerate testing techniques that help identify when flaws are present.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Scott Stender''' is a founding partner of iSEC Partners, a strategic digital security organization. Scott brings with him several years of experience in large-scale software development and security consulting, having worked at companies such as @stake and Microsoft. Scott is a noted researcher who focuses on secure software engineering and security analysis of core technologies. He holds a BS in Computer Engineering from the University of Notre Dame.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event 4 March (Tuesday) ===&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
'''Date:''' 03/04/2008&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6:30PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Billy Rios'''&lt;br /&gt;
&lt;br /&gt;
'''Bad Sushi - Beating Phishers at Their Own Game'''&lt;br /&gt;
&lt;br /&gt;
This talk will expose tactics and tools used by phishers, show how easy it is to hack into servers that are used to perform phishing, demonstrate how easy it is so follow a phsisher's trail to find out how they share information on US Citizens including SSNs, bank account numbers, credit card numbers, ATM PINs, you name it.&lt;br /&gt;
&lt;br /&gt;
Phishers usually setup their sites on servers they have compromised. In other words, the phishers have already done the hard work and it is easy to gain access to these servers. Due to the sheer volume of sites that need to be setup to perform a successful phish, phishers tend to be sloppy and leave traces everywhere.&lt;br /&gt;
&lt;br /&gt;
This talk will expose some of the tactics and tools used by phishers. Actual walk-through of how compromised hosts were accessed to gain information about the phishers will be presented.&lt;br /&gt;
&lt;br /&gt;
This talk will also show how easy it is to construct a trail from a compromised host to obtain information about individuals that is spewed on hacker message boards located outside the United States.&lt;br /&gt;
&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
'''Billy Rios''' lives in a phish bowl and is constantly being sent emails from acquaintances all over the world. Billy has won the Internet lotto several times, is expecting large sums of abandoned money from a long lost relative in the Congo, and has received checks accidentally made out for 30,000 instead of 30 US dollars.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Jon McClintock'''&lt;br /&gt;
&lt;br /&gt;
Session management is one of the most overlooked areas of web application security, and yet it can also be the most challenging feature to get right in your web application. This talk will provide a brief overview of web session management, followed by an exposition into how several common web application frameworks implement session management, finishing with a discussion of several classes of vulnerabilities that can arise through poor session management.&lt;br /&gt;
&lt;br /&gt;
'''Jon McClintock''' is a Senior Consultant for Leviathan Security Group, where he specializes in application security from design through implementation and into deployment. Prior to Leviathan, Jon was a Senior Software Engineer on Amazon.com's Information Security team, where he worked with software teams to define security requirements, assess application security, and educate developers about security software best practices.&lt;br /&gt;
&lt;br /&gt;
'''Date: 1/23/2008'''&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Waqas Nazir''', DigitSec&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/e/e9/Emerging_Threats_in_Distributed_Applications_%28Web_2%29.ppt presentation]&lt;br /&gt;
&lt;br /&gt;
Waqas Nazir has been working as an Information Security Consultant for clients such as Microsoft where he has delivered services in various arenas of information security. These include code reviews, black box assessments, product reviews, custom tools development for complex security problems, policy and process development. He has also worked with Microsoft Research (MSR) to develop a code analysis tool used for identifying areas of vulnerabilities in code. He has also been featured in Microsoft's Information Security Newsletter.&lt;br /&gt;
&lt;br /&gt;
Presentation Title: Emerging threats in Web 2.0&lt;br /&gt;
&lt;br /&gt;
Web 2.0 applications provide many rich features today such as hosting third party RSS Feeds, hosting third party web pages, translation services, and cross domain communication. While these rich features provide great functionality to end users, they can have serious security implications if not designed properly. Moreover, implementation flaws plague many of these features. This presentation will focus on some new emerging threats to Web 2.0 applications from a design and implementation perspective, leaving out the often covered Web 2.0 Vulnerabilities (Ajax, XSRF, etc).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Chris Clark''', iSEC Partners&lt;br /&gt;
&lt;br /&gt;
Chris Clark is a Senior Security Consultant at iSEC Partners, Inc. He possesses several years of experience in secure application design, penetration testing, and security process management. Most recently Chris worked for Microsoft performing security analysis and verification on enterprise management software and was previously responsible for the security of a web-based payment platform processing over 20 million credit card transactions per day. Chris has extensive experience in developing and delivering security trainings for large organizations, software engineering utilizing Win32 and the .Net Framework, and analyzing threats to large scale distributed systems. At Microsoft, Chris was responsible for the coordination of multiple product groups following the Microsoft Secure Development Lifecycle.&lt;br /&gt;
&lt;br /&gt;
Presentation Title: Ruby on Rails Security&lt;br /&gt;
&lt;br /&gt;
Ruby on Rails has been hailed for its ability to increase developer productivity by making web development easier.  Though Ruby on Rails may help developers create sites more quickly, it is no more immune to security threats than other web development frameworks.  Chris Clark will present the means by which the OWASP Top Ten manifest themselves in a Ruby on Rails environment, provide best practices for preventing these attacks, and discuss his ongoing research in Ruby-specific security concerns.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
11/29/2007 @ 6:30PM PST - Seattle chapter meeting&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bellevue Las Margaritas&lt;br /&gt;
&lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
'''Date:''' 11/29/2007&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 6PM&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Tom Gallagher''' has been intrigued with both physical and computer security from a young age. He is currently the lead of the Microsoft Office Security Test team. This team is primarily focused on penetration testing, writing security testing tools, and educating program managers, developers, and testers about security issues. Tom recently co-authored the MSPress title &amp;quot;Hunting Security Bugs&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Presentation Title: Hunting security bugs in your code&lt;br /&gt;
&lt;br /&gt;
Description: Finding security bugs is often regarded as an activity requiring secret powers or extremely specialized knowledge.  Some security bugs are difficult to uncover and require deep knowledge.  However, with basic knowledge many areas can be tested without much effort.  This presentation will show how to perform basic security testing using simple tools and the difference in effort between finding a bug and exploiting it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''David E Stevens III''', Senior ROI Analyst, Symplified Inc.&lt;br /&gt;
&lt;br /&gt;
In 2006, Symplified recruited Stevens for his expertise and ability to clearly explain concepts like Return On Investment (ROI) and Total Cost of Ownership (TCO). Over the past 5 years Stevens has given dozens of presentations regarding ROI, and is a confident and charismatic speaker. Stevens is touring the U.S. representing Symplified and teaching how ROI can be applied to security and Identity investments to technical security user groups.&lt;br /&gt;
&lt;br /&gt;
Synopsis of &amp;quot;Understanding ROI, TCO and other key financial aspects of IT Security&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In this presentation, Stevens teaches how security and IT professionals can obtain financing for important security initiatives using accounting principles such as Return On Investment (ROI) and Total Cost of Ownership (TCO). In this 30-minute presentation, the group learns what these terms mean and how they can be used to show the value of security software purchases. He concludes by sharing other tips on how the technology professional can better communicate with their business counterparts. This non-sales presentation is intended to equip attendees with useful tools that articulate the benefits of investing in IT security. Learn from Symplified's more than 30 years combined experience in Identity Management at hundreds of Fortune 500 organizations worldwide. Attendees receive a useful ROI calculator for IDM investments. This is a must attend presentation for anyone who has ever had trouble getting the funding they needed for a security software investment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
09/06/2007 @ 6PM PST - Seattle chapter meeting&lt;br /&gt;
&lt;br /&gt;
'''Details:'''&lt;br /&gt;
Location: &lt;br /&gt;
Bellevue Las Margaritas &lt;br /&gt;
437 108th Ave NE&lt;br /&gt;
Bellevue, WA 98004&lt;br /&gt;
(425) 453-0535&lt;br /&gt;
&lt;br /&gt;
Time: 6 o'clock&lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
* '''Rob Rachwald''' - Rob is a 10-year veteran of the high tech industry.  Rob started his tech career at Intel, where he worked on automating their complex supply chain.  Rob managed US product marketing for Commerce One and managed their marketing efforts in Asia Pacific. Rob, then, managed marketing for Coverity and joined Fortify as the Director of Product Marketing focusing on security and financial services. &lt;br /&gt;
** Online Banking - Abstract: Banks, often the biggest target of cyber attacks, have set an example for responsible security strategies.  How do the world's leading financial institutions balance risk against the pressures of delivering software to customers quickly?  How are developers trained to write code securely?  How are software security tools, such as dynamic and static analysis, deployed for optimal use?&lt;br /&gt;
* '''Damon Cortesi''' - Damon has worked in network and application security risk management for nearly a decade, beginning with his work as Systems and Security Administrator at his alma mater.  Following school, he entered the professional arena as an Information Security Consultant for one of the top 10 CPA firms serving financial institutions including banks, credit unions, and event the major credit reporting bureaus.  Most recently at IOActive, Mr. Cortesi has been serving the specialized needs of top technology companies in addition to standard penetration testing, web application security assessments, source code reviews, and PCI assessments.&lt;br /&gt;
** Web Hacking 101 introduces the basic concepts of web application security including SQL Injection, Cross-Site Scripting (XSS), and typical application logic flaws found in an ASP-based web application. These concepts are then put to use in a live demonstration that illustrates the all-too-common ways of attacking a web application and gaining unauthorized access to sensitive information or restricted areas of a website.  Demos will included manual SQL Injection techniques as well as the use of free/open-source tools used to expedite the extraction process, examples of both reflected and stored XSS that can be used to elevate the privileges of a user, and standard authorization bypass issues that developers often ignore.  Finally, basic mitigation techniques will be discussed that can be put into place by developers to prevent these common hacking techniques.&lt;br /&gt;
&lt;br /&gt;
''' Update: ''' - Rob's slides can be downloaded from [http://www.owasp.org/images/f/f6/SANS_Online_Banking_Case_study.ppt here].&lt;br /&gt;
''' Update #2: ''' - Damon's slides can be found [https://www.owasp.org/images/3/32/Web_Hacking_101.pdf here].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
2/28/2007 @ 6PM PST - Seattle chapter meeting&lt;br /&gt;
&lt;br /&gt;
'''Details:'''&lt;br /&gt;
&lt;br /&gt;
Location: Bellevue Las Margaritas (http://www.lasmargaritasbellevue.com/)&lt;br /&gt;
&lt;br /&gt;
Time: 6 o’clock. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:'''&lt;br /&gt;
* '''Dinis Cruz (Chief OWASP Evangelist)''' - Directly from London, Dinis will be doing two presentations at this event:&lt;br /&gt;
** '''Buffer Overflows on .Net and Asp.Net''' - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
** '''OWASP, the Open Web Application Security Project''' - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
** '''0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
&lt;br /&gt;
* '''Brad Hill (Senior Security Consultant with iSEC Partners)''',  will be speaking on:&lt;br /&gt;
** '''XML Digital Signature and Encryption: Use and Abuse''' - The WS-Security set of standards is on the threshold of ubiquitous deployment and XML applications have already taken over the world. This presentation looks at two underlying technologies, XML Digital Signature (XMLDSIG) and XML Encryption (XMLENC), their place in the Web Services stack and their applicability to non-SOAP XML applications. Beginning with a basic overview of the standards, we will uncover some surprising caveats and risks in the use of these technologies.&lt;br /&gt;
&lt;br /&gt;
=== Previous Meeting 8 January 2007===&lt;br /&gt;
1/8/2007 @ 6 o'clock - Seattle chapter meeting.  &lt;br /&gt;
&lt;br /&gt;
'''Details:''' Location: Bellevue Las Margaritas (http://www.lasmargaritasbellevue.com/)&lt;br /&gt;
Time: 6 o’clock. &lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
Ward Spagenberg of IOActive on the topic &amp;quot;Unraveling PCI&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Since there will be free food, beer and pop please let Mike de Libero know so we know how much to order.&lt;br /&gt;
We look forward to seeing you all there!&lt;br /&gt;
&lt;br /&gt;
[[Category:Washington]]&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114892</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114892"/>
				<updated>2011-08-01T04:34:53Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software development teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce functional, stable, reliable and scalable software where security is one attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Most security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers to improver software quality through better tooling that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Owasp std.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion [https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly looking for developers who will actively contribute code. We are especially interested in any developers that have experience in customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like JBehave.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in its infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will include it may include IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
Our current timeline looks like: &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
In due course (when we have a backlog) we will publish a roadmap.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114891</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114891"/>
				<updated>2011-08-01T02:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software development teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce functional, stable, reliable and scalable software where security is one attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Most security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers to improver software quality through better tooling that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Owasp std.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion [https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly looking for developers who will actively contribute code. We are especially interested in any developers that have experience in customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like JBehave.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in its infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will include it may include IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
Our current timeline looks like: &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
In due course (when we have a backlog) well publish a roadmap.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114889</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114889"/>
				<updated>2011-08-01T02:05:17Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce functional, stable, reliable and scalable software where security is one attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Most security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers to improver software quality through better tooling that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Owasp std.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion [https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly looking for developers who will actively contribute code. We are especially interested in any developers that have experience in customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like JBehave.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in its infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will include it may include IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
Our current timeline looks like:&lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
In due course (when we have a backlog) well publish a roadmap.&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114885</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114885"/>
				<updated>2011-07-31T19:49:30Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Owasp std.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion [https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will include it may include IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114884</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114884"/>
				<updated>2011-07-31T19:48:28Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Owasp std.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list (this is the main list)]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will include it may include IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_std.png&amp;diff=114883</id>
		<title>File:Owasp std.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_std.png&amp;diff=114883"/>
				<updated>2011-07-31T19:31:42Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: uploaded a new version of &amp;amp;quot;File:Owasp std.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP STD Project Banner&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114882</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114882"/>
				<updated>2011-07-31T19:28:46Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Owasp std.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list (this is the main list)]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will inlcude it may inlcude IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_std.png&amp;diff=114881</id>
		<title>File:Owasp std.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_std.png&amp;diff=114881"/>
				<updated>2011-07-31T19:27:16Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: OWASP STD Project Banner&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP STD Project Banner&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114880</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114880"/>
				<updated>2011-07-31T19:04:31Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-ad-where-at.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp;[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list (this is the main list)]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will inlcude it may inlcude IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114879</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114879"/>
				<updated>2011-07-31T18:49:54Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-ad-where-at.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion''' &lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader&amp;amp;nbsp[mailto:mark@curphey.com?subject=OWASP%20STD%20Project Mark Curphey]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list (this is the main list)]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will inlcude it may inlcude IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114878</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114878"/>
				<updated>2011-07-31T18:43:53Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-ad-where-at.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion'''&lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader Mark Curphey&amp;amp;nbsp;[mailto:owasp@owasp.org contact us]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list (this is the main list)]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will inlcude it may inlcude IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Project Planning &lt;br /&gt;
*September - Sprint 1 &lt;br /&gt;
*October - Sprint 2 &lt;br /&gt;
*November - Sprint 3 &lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
Project About &lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Development Guide | Project About}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114877</id>
		<title>OWASP Security Tools for Developers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Security_Tools_for_Developers_Project&amp;diff=114877"/>
				<updated>2011-07-31T18:40:25Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Home  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
This project is focused on defining, designing, developing and configuring security tools for software developmemt teams and their end-to-end software development process. While any reference material or code produced will be focused an open source stack and Agile development techniques,&amp;amp;nbsp;the concepts should be able to be easily applied to other styles of software engineering.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Most people accept that tools can only effectively be applied to a fraction of software issues where the fraction is generally increasing but at a relatively conservative pace. Tools are however an important and widely adopted part of the process needed to produce fucntional, stable, reliable and scalable software where security is one such attribute.&amp;amp;nbsp;Most development teams invest heavily in tools to improve their process and maintain end-to-end development environments including managing requirements and user stories, IDE's, test management, source code management, version control, continuous intregration, deployment and monitoring. &lt;br /&gt;
&lt;br /&gt;
Many security tools today are written by and for security people who often (understandably)&amp;amp;nbsp;have a different lens and different needs from software developers and development teams. &lt;br /&gt;
&lt;br /&gt;
This project is operating under the belief that infusing security into the development teams work-flow through effective tools will have a significant impact on improving the security quality of the code they produce.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
You can think of it as a project for developers by developers that just so happens to be about security.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-ad-where-at.png]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Wanna get involved?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....join the discussion'''&lt;br /&gt;
&lt;br /&gt;
While the project is open to all we are particularly loking for developers who will actively contributing code. We are especially interested in any developers that have experience of customizing Jenkins, extending Git, unit testing frameworks or customizing mangement tools like ScrumDo. We are also interested in any developers interested in extending behaviour driven development testing frameworks like Cucumber.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Join the mailing list, hang out and say hi or contact the project leader Mark Curphey&amp;amp;nbsp;[mailto:owasp@owasp.org contact us]. &lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-std mailing list (this is the main list)]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== What exactly are you producing?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''....the 50,000 ft plan''' &lt;br /&gt;
&lt;br /&gt;
The project is still in it's infancy but the plan is to produce the following: &lt;br /&gt;
&lt;br /&gt;
*Reference Architecture &lt;br /&gt;
*Reference Implementation&lt;br /&gt;
&lt;br /&gt;
As part of those two key areas we expect to build or customize tools and develop configuration guides for particular technologies. While we don't yet know exactly what that will inlcude it may inlcude IDE plugins or extensions to common testing frameworks to make integrating security tests easier. &amp;amp;nbsp;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== How are you doing this?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]&amp;amp;nbsp;'''....by being Agile of course!''' &lt;br /&gt;
&lt;br /&gt;
We are planning to run the project like an Agile software project itself by building a backlog and running sprints. We may even try and use Google Hangouts for video stand-up meetings! &lt;br /&gt;
&lt;br /&gt;
*August - Planning&lt;br /&gt;
*September - Sprint 1&lt;br /&gt;
*October - Sprint 2&lt;br /&gt;
*November - Sprint 3&lt;br /&gt;
*December - Sprint 4&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Project About &lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Development Guide | Project About}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_The_OWASP_Web_Security_Certification_Framework&amp;diff=21634</id>
		<title>SpoC 007 - The OWASP Web Security Certification Framework</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_The_OWASP_Web_Security_Certification_Framework&amp;diff=21634"/>
				<updated>2007-09-10T14:40:52Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: /* Mark Curphey – The OWASP Web Security Certification Framework */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AoC Candidate''':  Mark Curphey&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 45% Complete, [[SpoC 007 - OWASP Web Security Certification Framework - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
Web site owners need a widely published and consensus driven set of criteria to design, develop, deploy and maintain secure web sites. This criteria and claims of compliance with it need to be able to be provided to a wide range of stakeholders including customers, regulators and business partners. &lt;br /&gt;
&lt;br /&gt;
This document is a discussion document created by Mark Curphey . It was sponsored and produced as part of the OWASP Spring of Code, 2007 and proposes an evaluation and certification scheme for the security of web sites including recommendations for how the evaluation and certification process itself could work. This work is intended to be openly published for a reasonable period of time for public discussion, debate and feedback. After this period the OWASP Board will work with interested parties to determine any appropriate next steps. These may include adoption or integration into existing standards or the creation of something new.&lt;br /&gt;
The evaluation and certification scheme proposed here takes into account the motivations and needs of a variety of stakeholders.  Many people including the author have been highly critical of the Payment Card Industry Data Security Standard (PCI DSS). The OWASP Web Security Certification Criteria is not a proposal to replace the PCI DSS and is not officially related in anyway shape or form. PCI DSS has been taken into account however we have intentionally chosen not to build upon or build around key PCI issues that we consider ill-conceived. In short we have decided to build on solid foundations from the ground up.&lt;br /&gt;
&lt;br /&gt;
It is very important to understand that in itself this document and the project that supports it is not an evaluation scheme or criteria, but a proposal for what an effective one may look like. In fact the scheme has been created in such as way as to provide a framework from which to derive domain specific evaluation schemes from (US financial services, UK Gov or Indian Insurance). This document itself comprises of two main parts;&lt;br /&gt;
&lt;br /&gt;
Part 1 – Implementation Considerations. This section describes key processes and how they would work  in order for the evaluation and certification scheme to be effective. &lt;br /&gt;
Part 2 – Evaluation Criteria. This section describes the actual criteria being proposed.  It adopts the recommendations from Part 1.&lt;br /&gt;
You can send your feedback directly to mark@curphey.com or at the OWASP mailing list dedicated to this project (https://lists.owasp.org/mailman/listinfo/owasp-webcert).&lt;br /&gt;
We hope this document provides value and provokes thought to all those identified in the stakeholders section. &lt;br /&gt;
&lt;br /&gt;
Kind regards, 	Mark Curphey and the entire OWASP Project Team.&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Web_Security_Certification_Framework_-_Progress_Page&amp;diff=21633</id>
		<title>SpoC 007 - OWASP Web Security Certification Framework - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Web_Security_Certification_Framework_-_Progress_Page&amp;diff=21633"/>
				<updated>2007-09-10T14:39:15Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: New page: The OWASP Web Security Evaluation and Certification project is well underway. In fact at this point in writing I intend to fully complete the first draft by COB Friday September the 10th. ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP Web Security Evaluation and Certification project is well underway. In fact at this point in writing I intend to fully complete the first draft by COB Friday September the 10th.&lt;br /&gt;
&lt;br /&gt;
So far we have met the following milestones;&lt;br /&gt;
&lt;br /&gt;
Defined the criteria for a good standard and set out key proposals for consideration&lt;br /&gt;
Defined the structure for a scaleable scheme and built the generic framework&lt;br /&gt;
Defined the generic controls for the technology section&lt;br /&gt;
Defined the generic controls for the process section&lt;br /&gt;
&lt;br /&gt;
Left to do&lt;br /&gt;
&lt;br /&gt;
Define controls for the people section&lt;br /&gt;
Refine all controls&lt;br /&gt;
&lt;br /&gt;
Configure all controls to create a reference implementation&lt;br /&gt;
&lt;br /&gt;
There are several services companies already planning to offer services around this project and several banks planning to adopt it for their 3rd party security assessment criteria. This is very encouraging!&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17509</id>
		<title>OWASP Spring Of Code 2007 Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17509"/>
				<updated>2007-03-28T15:06:07Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: /* Mark Curphey – A Better Web Security Evaluation Criteria */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains project Applications to the [[OWASP_Spring_Of_Code_2007]]&lt;br /&gt;
&lt;br /&gt;
'''If you want to apply for a SpoC 007 sponsorship you HAVE TO USE THIS PAGE for your application'''&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_Spring_Of_Code_2007#How_To_Participate]] for what do to one you completed your Application&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proposed template:''' {for longer proposals, in addition to these details you can create a PDF}:&lt;br /&gt;
&lt;br /&gt;
== {Your first name or Alias} - {Project name} ==&lt;br /&gt;
Please remember that projects will be selected and funded based on how well they meet the [[OWASP_Spring_Of_Code_2007_:_Selection|Selection Criteria]].&lt;br /&gt;
&lt;br /&gt;
You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic.  We strongly suggest that you include the following information in your proposal.&lt;br /&gt;
&lt;br /&gt;
* Your educational and professional background&lt;br /&gt;
&lt;br /&gt;
* Application security experience and accomplishments&lt;br /&gt;
&lt;br /&gt;
* Participation and leadership in open communities&lt;br /&gt;
&lt;br /&gt;
* The opportunity, challenges, issues or need your proposal addresses&lt;br /&gt;
&lt;br /&gt;
* Objectives or ways in which you will meet the goal(s)&lt;br /&gt;
&lt;br /&gt;
* Specific activities and who will carry out these activities&lt;br /&gt;
&lt;br /&gt;
* Specific deliverables and a rough project schedule so we can track progress&lt;br /&gt;
&lt;br /&gt;
* Long-term vision for the project&lt;br /&gt;
&lt;br /&gt;
* Any other reasons why you and your project should be selected&lt;br /&gt;
&lt;br /&gt;
== Buanzo - Enigform: Firefox Addon for OpenPGP signing of HTTP requests ==&lt;br /&gt;
&lt;br /&gt;
I am a 25 year old Independent security consultant from Buenos Aires, Argentina, that has contributed to the world of&lt;br /&gt;
information systems security since 1994, when BBSes and Linux still lived together.&lt;br /&gt;
&lt;br /&gt;
A quick search for buanzo on google [http://www.google.com/search?hl=en&amp;amp;q=buanzo&amp;amp;btnG=Google+Search] will provide all necessary details about my professional and community background. For comprobable experience, you could also check my Rent a Coder profile.[http://www.rentacoder.com/RentACoder/SoftwareCoders/showBioInfo.asp?lngAuthorId=735204].&lt;br /&gt;
&lt;br /&gt;
In my free time I like playing with my Punk-Pop band [http://www.purevolume.com/futurabandapunkpop], Futurabanda. [http://www.futurabanda.com.ar], and maintaining my Restaurants, Wines and Recipes site. [http://www.vivamoslavida.com.ar]. I have to admit that my first priorities are my beloved son [http://www.fotolog.com/buanzo] and my wonderful wife [http://www.fotolog.com/buanzo].&lt;br /&gt;
&lt;br /&gt;
=== Accomplishments ===&lt;br /&gt;
&lt;br /&gt;
I've contributed scripts, fixes and translations to the Nmap project. I've also acted as Expert Contributor for SANS TOP-20 2004, 2005 and 2006. I've developed &lt;br /&gt;
tools that can be found in Freshmeat, like mprl (a getty enhancement to allow remote logins from the login: prompt of the console). I've also written&lt;br /&gt;
the Unix chapter of the OISSG's Information Systems Security Assessment Framework, v0.1 [http://www.oissg.org/content/view/71/71/]. I'm currently writing&lt;br /&gt;
an Internet Draft to be proposed for RFC regarding Enigform.&lt;br /&gt;
&lt;br /&gt;
=== Community ===&lt;br /&gt;
&lt;br /&gt;
I run the official 2600 meetings site for Argentina [http://www.2600.com/meetings/pages.html], I've been proposed, but I refused, for President of the Argentinian Free Software group called SOLAR [www.solar.org.ar]. I'm an active member of the FLOSS community since 1996, having written articles in magazines http://www.net-security.org/dl/articles/Detecting_and_Understanding_rootkits.txt, made TV, radio&lt;br /&gt;
and newspaper appearances [http://codigoabierto.bitacoras.com/archivos/2005/04/01/buanzo-hacks] and led different security research groups of Spain, Mexico and Argentina. Currently I contribute time thorugh my sites, forums and blogs,&lt;br /&gt;
answering questions in mailing lists and helping coordinate some local LUGs. I do also manager the Linux Counter for Argentina [http://counter.li.org/reports/place.php?place=AR].&lt;br /&gt;
&lt;br /&gt;
=== My Project ===&lt;br /&gt;
&lt;br /&gt;
Enigform [http://enigform.mozdev.org] is a Firefox extension that enhances HTTP with OpenPGP functionality. It digitally signs outgoing HTTP requests so that a web server can authenticate the identity and data of the incoming request. It is a Web Security tool because it can, if correctly implemented as any OpenPGP based technology, render man in the middle attacks useless. I think OpenPGP already speaks for itself regarding eMail. Imagine the same benefits for http and web applications. I think Enigform can fit into the OWASP Validation Project [http://www.owasp.org/index.php/Category:OWASP_Validation_Project].&lt;br /&gt;
&lt;br /&gt;
Enigform is the reference implementation of the Internet Draft I'm working on, in discussion with members of the IETF's OpenPGP Working Group.&lt;br /&gt;
&lt;br /&gt;
Some simple PHP code is enough to make a web application Enigform-aware [http://enigformtest.buanzo.com.ar]. The Smutty PHP MVC Framework already supports Enigform [http://smutty.pu-gh.com/demo/enigform].&lt;br /&gt;
&lt;br /&gt;
=== Long Term ===&lt;br /&gt;
&lt;br /&gt;
Have the Draft be proposed as a Standards Track RFC document, have Enigform support directly in Apache and IIS, and port Enigform to other browsers&lt;br /&gt;
and/or programming languages, and also provide OpenPGP De/Encryption support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why should I be selected ===&lt;br /&gt;
&lt;br /&gt;
I have the experience, security awareness and means to make this project THE web security project of the decade. I am a respected member of the&lt;br /&gt;
international security community, and I firmly believe Enigform is my greatest idea so far.&lt;br /&gt;
&lt;br /&gt;
== Eoin Keary - Code review Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the OWASP Code review guide during this period.&lt;br /&gt;
The code review guide was started by me in 2005 and has much information on reviewing code for common vulnerabilities. It is frequently accessed (looking at the stats on the OWASP site) and therefore is useful to practitioners. &lt;br /&gt;
&lt;br /&gt;
I believe the code review guide is an integral part of the OWASP BOK (Body of Knowledge). Ensuring secure development is key to secure applications and code review is of paramount importance in this domain.&lt;br /&gt;
&lt;br /&gt;
There are many sections still to be added and more to be readjusted and rewritten to reflect the current state of the security world.&lt;br /&gt;
Much needs to be written on Web 2.0 technologies and distributed B2B technologies such as Webservices.&lt;br /&gt;
 &lt;br /&gt;
The Code review process and procedure needs also to be covered. A guide to establishing a mature code review process also needs to be done.&lt;br /&gt;
Code review methodologies also need to be discussed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the code review guide:&lt;br /&gt;
* Add additional areas relating to the code review process such as:&lt;br /&gt;
** Benefits and pitfalls&lt;br /&gt;
** Methodology&lt;br /&gt;
** The code review process&lt;br /&gt;
*** Transactional analysis&lt;br /&gt;
*** Managing the code review process&lt;br /&gt;
*** Assigning risk to findings&lt;br /&gt;
&lt;br /&gt;
** Technical guides&lt;br /&gt;
*** Language specific best practice &lt;br /&gt;
*** Java &lt;br /&gt;
*** .NET &lt;br /&gt;
*** PHP &lt;br /&gt;
*** MySQL &lt;br /&gt;
*** Stored Procs &lt;br /&gt;
*** C/C++ &lt;br /&gt;
&lt;br /&gt;
** Code review by vulnerability:&lt;br /&gt;
*** Reviewing Code for Buffer Overruns and Overflows &lt;br /&gt;
*** Reviewing Code for OS Injection&lt;br /&gt;
*** Reviewing Code for SQL Injection&lt;br /&gt;
*** Reviewing Code for Data Validation&lt;br /&gt;
*** Reviewing code for XSS issues&lt;br /&gt;
*** Reviewing Code for Error Handling&lt;br /&gt;
*** Reviewing Code for Logging Issues&lt;br /&gt;
*** Reviewing The Secure Code Environment&lt;br /&gt;
*** Reviewing code for Authorization Issues&lt;br /&gt;
*** Reviewing code for Authentication Issues&lt;br /&gt;
*** Reviewing code for Session Integrity&lt;br /&gt;
*** Reviewing code for Cross Site Request Forgery&lt;br /&gt;
*** Reviewing code for Cryptography implementation issues&lt;br /&gt;
*** Reviewing code Dangerous HTTP Methods (Deployment)&lt;br /&gt;
*** Race Conditions &lt;br /&gt;
&lt;br /&gt;
The areas of code are structured giving a brief explanation, the anti-pattern (vulnerable pattern to look for) and a suggested fix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I used to head up the code review team as part of the application security group in fidelity investments and have 5+ years of the secure code review process. &lt;br /&gt;
I also was the lead of the Testing guide until V2 was published via the Autumn of Code. &lt;br /&gt;
&lt;br /&gt;
I have always  delivered any work I have volunteered for on time. &lt;br /&gt;
 &lt;br /&gt;
I have been involved in OWASP projects for 2/3 years now and have always been an active contributor.&lt;br /&gt;
&lt;br /&gt;
== Paolo Perego - Owasp Orizon Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
Owasp Orizon [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project] Project born in 2006 as answer to the lack of common engine and library usable by opensource code review related tools.&lt;br /&gt;
&lt;br /&gt;
I'm proposing that, during the Spring of Code 2007 period, I'll complete static analisys API and java source code enforment objects.&lt;br /&gt;
&lt;br /&gt;
Sometimes a complete code review approach is not suitable for most customers who wants to harden their code which is being approaching release stage. For such a reason, I started writing Java objects that embeds most of the security checks against common web vulnerabilities (XSS, SQL injection, Session handling, ...) so that source code can be hardened with a small effort in terms of code rewriting.&lt;br /&gt;
&lt;br /&gt;
I do believe that a common set of API and a common safe coding best practices library is one of the most important goals to bring application security to the developers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Completing the static code review API section&lt;br /&gt;
* improving programming language to XML translator&lt;br /&gt;
* improving security best practices code review scan library&lt;br /&gt;
* improving secure coding fashion best practices library&lt;br /&gt;
* writing the pattern matching scan using the aformentioned libraries&lt;br /&gt;
Writing the java source code enforment objects&lt;br /&gt;
* writing an object to handle form data values to avoid XSS&lt;br /&gt;
* writing an object to handle form data values to avoid SQL Injection&lt;br /&gt;
* writing an object to handle HttpRequest and HttpSession objects&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
Owasp Orizon is the first Owasp project I'm involved in. I'm also contributor of Owasp Italian chapter managed by Matteo Meucci and I'm talking at various speeches about application security and safe coding best practices.&lt;br /&gt;
&lt;br /&gt;
I'm a security consultant working in ethical hacking and we're approaching code review and safe topics right now.&lt;br /&gt;
I'm a developer too so I understand also the &amp;quot;dark side&amp;quot; of the problem developing code with security in mind.&lt;br /&gt;
&lt;br /&gt;
I work using the &amp;quot;release early release often&amp;quot; paradigm so to be concrete and let other people having something usable to work with.&lt;br /&gt;
&lt;br /&gt;
== Sebastien Deleersnyder - OWASP Education Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
This Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences. &lt;br /&gt;
&lt;br /&gt;
Web Application Security Education and Awareness is needed throughout the entire organization, each area and level of organizations have specific needs and requirements regarding education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience. &lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Currently the project goals are to create Educational Tracks: &lt;br /&gt;
* Complete the [[OWASP Education Presentation|consolidation page of OWASP presentations]] performed in the past&lt;br /&gt;
* A &amp;quot;Web Application Security Primer&amp;quot; Track for beginners (4 hours) &lt;br /&gt;
* A &amp;quot;What developers should know on Web Application Security&amp;quot; Track for developers (4 hours) &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''': &lt;br /&gt;
I started the successful Belgian Chapter 3 years ago and have actively contributed to OWASP since then. I also co-organized the European conference last year in Belgium.&lt;br /&gt;
&lt;br /&gt;
This is the first separate project that I started, originating from a local demand to set up educational tracks for people that are new to Web Application Security. There are literally hundreds of presentations and an enormous amount of information on the OWASP web site. The goal of this project is to restructure pieces of that information in reusable modules that can be combined in educational tracks. It is my believe that awareness is an important cornerstone of building secure web applications, and this project will actively support that.&lt;br /&gt;
&lt;br /&gt;
If we are granted Spoc 007 participation, I will be sharing the budget with all active participants. This will be an extra motivation for project participation. I will reinvest my part in the project to set up a web conferencing / web casting solution to be used to disseminate the project results and make them available for later use.&lt;br /&gt;
&lt;br /&gt;
* '''More details''': &lt;br /&gt;
The detailed [[OWASP Education Project Roadmap|road map]] can be found here.&lt;br /&gt;
The SpoC 007 goal is to finish Sub Goals 1, 2, 3 and 4. If time permits we can start with sub goal 5.&lt;br /&gt;
&lt;br /&gt;
== Subere - OWASP JBroFuzz Project ==&lt;br /&gt;
&lt;br /&gt;
==== Overview ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. The purpose of this application is to provide a single, portable application that offers stable cross-platform network protocol fuzzing capabilities. At the same time, JBroFuzz attempts to keep the User Interface (UI) as intuitive as possible.&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ==== &lt;br /&gt;
&lt;br /&gt;
As seen by the emphasis given on the subject of fuzzing in the 2007 Testing Guide (v2), network protocol fuzzing serves as a fundamental cornerstone of application security testing. For this, many different categories and types of fuzzing have been defined.&lt;br /&gt;
&lt;br /&gt;
==== Objectives ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz needs to expand and grow in order to cover network fuzzing in a more complete manner. Its modular implementation allows for the addtion of new functionality by means of independent tabs. The key tabs proposed to be added during the spring of code 2007 are (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab'''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab'''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing using HTTPClient'''&lt;br /&gt;
* '''Blind SQL Injection Fuzzing Tab'''&lt;br /&gt;
&lt;br /&gt;
At the same time, the following existing tabs need to be updated and made more robust (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs'''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue'''&lt;br /&gt;
* '''Update Generators file format'''&lt;br /&gt;
* '''Include SOAP and XML fuzzing'''&lt;br /&gt;
&lt;br /&gt;
This expansion process relates to stabilising code that is presently included in JBroFuzz, thus allowing it to run for extensive periods of time (24h+) as well as adding more functionality in terms of the three new tabs.&lt;br /&gt;
&lt;br /&gt;
==== Deliverables ==== &lt;br /&gt;
&lt;br /&gt;
Based on the above, the new code elements that will be added are as follows:&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab:''' ''Provide the ability to enumerate e-mails from newsgroups without breaching google automated search rules''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab:''' ''Provide the ability to enumerate NTLM as well as brute over HTTP/S NTLM.''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing:''' ''Implement a fuzzing tab utilising HTTPClient from Jakarta that will also allow for multi-threading''&lt;br /&gt;
* '''Blind SQL Fuzzing Tab''' ''Implement a tab that extracts information from a blind SQL injection point identified on web server over HTTP/HTTPS.''&lt;br /&gt;
&lt;br /&gt;
For updating existing code elements that require a partial rewrite, the following areas of focus are presented in detail: &lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs:''' ''Provide the ability to graph fuzzing results during a particular session run. This will give the ability to integrate and pickup potential fuzzing patterns.''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue:''' ''Update the code of the sniffing panel in order to handle threaded agents in a more memory efficient way.''&lt;br /&gt;
* '''Update Generators file format:''' ''Update the generators file format to allow for the parsing and creation of recursive generators.''&lt;br /&gt;
* '''Include SOAP and XML fuzzing:''' ''Include an up to date list of SOAP and XML fuzzing templates.''&lt;br /&gt;
&lt;br /&gt;
Overall, the above two lists of changes should provide sufficient complexity and output for the spring of code 2007, forming a challenging implementation project.&lt;br /&gt;
&lt;br /&gt;
==== Background ==== &lt;br /&gt;
&lt;br /&gt;
In its short life, the OWASP JBroFuzz Project has attracted the interest of the online security community with a total of appr. 5000 downloads in the last months. &lt;br /&gt;
&lt;br /&gt;
Coming from a strong java background (5+ years) I decided to implement and release JBroFuzz in order to initially simplify penetrations testing processes that relate to web application and network protocol fuzzing.&lt;br /&gt;
&lt;br /&gt;
I see the spring of code 2007 as a unique opportunity to industrialise network protocol fuzzing (and in particular HTTP/S fuzzing) within a single application, residing within OWASP.&lt;br /&gt;
&lt;br /&gt;
==== Why should JBroFuzz be sponsored? ==== &lt;br /&gt;
&lt;br /&gt;
Centralising fuzzing resources into one application that has the ability to handle network protocol fuzzing over HTTP and HTTPS in a simple and intuitive manner forms an area of focus that should not be dismissed in building secure software applications.&lt;br /&gt;
&lt;br /&gt;
Keep the code platform independent adds a huge advantage. &lt;br /&gt;
&lt;br /&gt;
Receving an OWASP grant from the spring of code 2007 will trigger a share in the budget with all active participants depending on their level of involvement. This will be a direct function of the number of tabs and/or user functionality that they have assisted in implementing.&lt;br /&gt;
&lt;br /&gt;
== Joshua Perrymon - OWASP LiveCD Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the second version of the OWASP LiveCD during this period.&lt;br /&gt;
The first version of the LiveCD is now available and include many of the current OWASP documents and tools. I believe the LiveCD is one of the best mediums to promote OWASP tools and documentation. It is portable and already being used by thousands of security proffesionals to perform application testing and training. &lt;br /&gt;
&lt;br /&gt;
In the current state the CD is stable and contains a lot of tools. However, this is just the beginning. There is a LOT of work that needs to be completed. The entire CD experience needs to be branded using OWASP graphics. This shouls start with the boot screen and carry all the way through to the icons and desktop graphics. The CD should also inlcude the wiki and ALL the tools developed for OWASP.&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the LiveCD:&lt;br /&gt;
* Complete OWASP branding&lt;br /&gt;
* Add OWASP wiki&lt;br /&gt;
* Add encryption capabilities&lt;br /&gt;
* Add more OWASP tools&lt;br /&gt;
* Add more pen-test tools such as;&lt;br /&gt;
 VOIP, RFID, BlueTooth, Wireless, etc..&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I had the idea of the LiveCD about a year ago and have worked very hard to get the first version developed. This was driven by my vision to make all of the OWASP tools available on a portable medium. The main difference in the OWASP liveCD vs. other live CDs is going to be the regularity of updates. If sponsorship can be obtained the CD could be updated on a monthly basis. Not once a year like other liveCDs. The CD will also include specialty tools and documentation to perform VOIP, RFID,Bluetooth, and wireless security assessments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Mark Curphey – The OWASP Web Security Certification Framework ==&lt;br /&gt;
&lt;br /&gt;
'''Problem'''&lt;br /&gt;
 &lt;br /&gt;
PCI DSS is attracting a lot of criticism for a lot of valid reasons. &lt;br /&gt;
 &lt;br /&gt;
http://securitybuddha.com/2007/03/23/the-problems-with-the-pci-data-security-standard-part-1/&lt;br /&gt;
&lt;br /&gt;
http://blogs.csoonline.com/node/210&lt;br /&gt;
&lt;br /&gt;
http://www.computerweekly.com/blogs/stuart_king/2007/03/more-on-pci---the-audit-guide.html&lt;br /&gt;
&lt;br /&gt;
The list is of course long and not appropriate here……and while its easy to knock PCI, there is nothing better out there. &lt;br /&gt;
&lt;br /&gt;
'''Solution and Deliverables'''&lt;br /&gt;
&lt;br /&gt;
As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate. &lt;br /&gt;
&lt;br /&gt;
This project would address the;&lt;br /&gt;
&lt;br /&gt;
'''Standard''' &lt;br /&gt;
*A complete auditable (important) web site security standard suitable for modern e-commerce companies including&lt;br /&gt;
**The technical things people should care about&lt;br /&gt;
**The operational  / management things people should care about&lt;br /&gt;
'''Certification Model''' &lt;br /&gt;
*A complete framework for certification (ongoing) and implementation (including certifying auditors, ongoing validation etc). This will include for example the model for certifying auditors (including the actual test program); checklists and forms for auditors to complete and other supporting material. &lt;br /&gt;
&lt;br /&gt;
Essentially its a complete blueprint for an organisation like OWASP or a regulatory body need to run a web site security certification program complete with the supporting material to implement it.&lt;br /&gt;
&lt;br /&gt;
Note:  This is no trivial task to get right. I would need to ensure I can commit to completing the work to a good quality. I think this will take at least 2 months from start to finish to complete but I think is very important for the industry and for potentially for OWASP.  I wanted to gauge the interest by first posting this.&lt;br /&gt;
&lt;br /&gt;
== Erwin Geirnaert - OWASP Java Project ==&lt;br /&gt;
&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I would like to help the OWASP Java Project to gather all Java security related information and to document any domains that lack documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
The main objective I see is to gather all information in one place, where security experts and developers can find the information they need.&lt;br /&gt;
In order to get there, I need to collect all information in the OWASP Wiki, ask people if they want to donate it to OWASP so that we can include it as public material, add URLs, white-papers, references to books, ... And if time permits, write some documentation myself.&lt;br /&gt;
&lt;br /&gt;
One deliverable is the OWASP Top 10 for J2EE applications with clear examples of vulnerabilities and mitigations.&lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''':&lt;br /&gt;
I have more then 10 years experience in Java and J2EE and the last 6 years I have tested and broke a lot of web applications. I gave also some very successful J2EE security courses and web security courses. I spoke at different conferences about application security in Europe.&lt;br /&gt;
And I am responsible for the security track at Javapolis, one of the biggest Jave conferences in Europe.&lt;br /&gt;
I am the co-founder of ZION SECURITY where we do security testing, code review, design reviews, training,...&lt;br /&gt;
I'm also member of the OWASP Belgium board that started in March 2007.&lt;br /&gt;
&lt;br /&gt;
== Erwin Geirnaert - OWASP WebGoat Solutions Guide ==&lt;br /&gt;
&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
WebGoat is used by a lot of people to learn about web application security and the different vulnerabilities. But it takes a lot of time to grasp how the tools like WebScarab work and how to use them effectively in WebGoat. I propose to create a walkthrough of the lessons in WebGoat so that people can learn from the solutions, without spoiling the fun.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
The WebGoat Solutions Guide is a document that can be bundled with WebGoat. Each lesson contains a detailed solution with screenshots and tools. I created a PDF with the solution for WebGoat 4.0 but this is too big to load (15 MB) and is not very practical.&lt;br /&gt;
&lt;br /&gt;
After a discussion with Bruce about this, we think that the solutions should be made like the existing Lessons Plan so it is easier to maintain and update when a lesson changes. This means that there will be documentation folder and an individual solution for each lesson. &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''':&lt;br /&gt;
I have more then 10 years experience in Java and J2EE and the last 6 years I have tested and broke a lot of web applications. I gave also some very successful J2EE security courses and web security courses. I spoke at different conferences about application security in Europe.&lt;br /&gt;
And I am responsible for the security track at Javapolis, one of the biggest Jave conferences in Europe.&lt;br /&gt;
I am the co-founder of ZION SECURITY where we do security testing, code review, design reviews, training,...&lt;br /&gt;
I'm also member of the OWASP Belgium board that started in March 2007.&lt;br /&gt;
&lt;br /&gt;
== Bunyamin Demir – OWASP WeBekci Project ==&lt;br /&gt;
&lt;br /&gt;
==== Executive Summary: ====&lt;br /&gt;
&lt;br /&gt;
Web application firewalls (WAF) are gaining importance among the information security technologies designed to protect web sites from attack. WAF solutions prevent attacks that network firewalls and intrusion detection systems can't and they require no modification of application source code. ModSecurity [http://www.modsecurity.org/] is an open source web application firewall that runs as an Apache module. It is an embeddable web application firewall and it provides protection from a range of attacks against web applications. It is an open source project available to everyone; it however does not come with an admin panel. &lt;br /&gt;
&lt;br /&gt;
I decided to provide this essential tool with a control panel which I believe will ease and thus encourage its usage.&lt;br /&gt;
&lt;br /&gt;
ModSecurity allows for HTTP traffic monitoring and real-time analysis with no changes to existing infrastructure. My main goal is to analyze attacks and generate rules to change the configuration of the ModSecurity accordingly.&lt;br /&gt;
&lt;br /&gt;
ModSecurity  has a feature called “flexible rule engine” as its heart of Attack Prevention capability . It uses ModSecurity’s “Rule Language,” (a programming language designed to work with HTTP transaction data). It is easy to use and flexible; yet the system administrators need to learn its own rules to create what is called “Certified ModSecurity Rules” to be implemented. My control panel will automate the major code-generation in Rule Language. &lt;br /&gt;
&lt;br /&gt;
==== Objectives and Deliverables: ====&lt;br /&gt;
&lt;br /&gt;
* '''Configuration''' : Will add all configuration parameter&lt;br /&gt;
* '''Rule Generator''': Will write all the Rules in Rule Language&lt;br /&gt;
* '''Logging'''       : Auditlog and debuglog will be added.&lt;br /&gt;
* '''Multiple-DB'''   : Will add PostgreSql and Sqlite support.&lt;br /&gt;
&lt;br /&gt;
==== Why I should be sponsored for the project: ====&lt;br /&gt;
&lt;br /&gt;
I am  involved with OWASP Turkey [http://www.owasp.org/index.php/Turkey] and interested very much in WAF. Even though this is my first project for OWASP, I am very much interested in every aspect of ModSecurity. With SpoC007’s support I will finalize my work on OWASP WeBekci [http://www.owasp.org/index.php/Category:OWASP_WeBekci_Project].&lt;br /&gt;
&lt;br /&gt;
== Eric Sheridan and Dr. Goran Trajkovski - The Scholastic Application Security Assessment Project ==&lt;br /&gt;
&lt;br /&gt;
=== ABSTRACT ===&lt;br /&gt;
&lt;br /&gt;
One of the major goals of the Open Web Application Security Project is to educate developers in the field of application software security. Understanding the risks and threats associated with web application software is pivotal in building a mature application security process. While OWASP has made a significant impact in the professional industry, more time and energy should be focused towards the academic community. It is an unfortunate fact that most universities do not require a stringent software security course for their computer science students. Consequently, most young developers do not have the ability to assess and mitigate the risks and threats for their own applications. It is for this reason that we believe the Open Web Application Security Project should fund an initiative to encourage the adaptation of application software security methodologies in the academic course curriculum.&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Project is intended to be the first step towards integrating security requirements in academic course curriculums. The primary goal of the project is to give students hands-on experience performing application security assessments using the tools and documentation found at http:///www.owasp.org. The assessment, lead by an application security professional, will demonstrate to students how the information and tools found at OWASP can be used to assess and ultimately increase the overall security posture of a web application. &lt;br /&gt;
&lt;br /&gt;
This project contributes towards bridging the gap between academia and industry, by equipping students with hands-on ready-for-the-job-market skills in the application software securing industry.&lt;br /&gt;
&lt;br /&gt;
=== PARTICIPANTS ===&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Assessment Project requires that college level students, lead by an application security professional, perform a security audit on an open source web application using the tools and information available at OWASP.&lt;br /&gt;
&lt;br /&gt;
::*'''Application Security Professional''' – Eric Sheridan ([http://www.aspectsecurity.com Aspect Security])&lt;br /&gt;
::*'''Towson University (TU) Partner''' – Dr. Goran Trajkovski, Towson University (http://www.towson.edu)&lt;br /&gt;
::*'''Students''' – Students of TU’s Application Software Security Course (COSC 458), nominated by the TU Partner&lt;br /&gt;
::*'''Web Application''' – The Open WebMail Project (http://openwebmail.org/)&lt;br /&gt;
&lt;br /&gt;
=== OWASP UTILIZATION ===&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Assessment Project requires heavy utilization of existing OWASP tools and utilities. Through this requirement, the project will illustrate the fact that existing OWASP resources can be used and heavily relied upon in a professional security audit. The following is a list of notable OWASP resources whose use will be documented throughout the assessment:&lt;br /&gt;
&lt;br /&gt;
::*'''OWASP Top Ten 2007''' - The security critical areas that the students will assess in the review&lt;br /&gt;
::*'''OWASP Testing Guide v2''' – The primary resource for building penetration testing cases&lt;br /&gt;
::*'''OWASP Guide''' – The primary resource for technical details pertaining to a technology and/or vulnerability&lt;br /&gt;
::*'''OWASP WebScarabNG''' – The primary proxy utility used throughout the assessment&lt;br /&gt;
&lt;br /&gt;
=== THE FINAL REPORT ===&lt;br /&gt;
&lt;br /&gt;
Students are required to follow the principle of “responsible disclosure” during the course of the security assessment. The developers of the open source application will be notified if any significant issues are found. Once the assessment is complete, a final report will be delivered to the application developers and the appropriate OWASP Spring of Code personnel. For each finding in the report, the students will be required to describe how the tools and information found at OWASP were used in the discovery.&lt;br /&gt;
&lt;br /&gt;
=== HOW DOES OWASP BENEFIT? ===&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Assessment Project is specifically designed to benefit the OWASP brand:&lt;br /&gt;
&lt;br /&gt;
''The OWASP Community…''&lt;br /&gt;
::*will be provided a case study proving that the resources available at OWASP can be utilized in an academic  environment, that can be later used in advertising the OWASP efforts to similar programs as the one at TU.&lt;br /&gt;
::*will be providing students a hands on experience in learning and testing for the latest web application security threats, thus potentially enlarging the OWASP community of contributors and supporters.&lt;br /&gt;
::*will be addressing the need to educate developers in the security critical areas.&lt;br /&gt;
::*will be seen as offering a professional level service to another open source project.&lt;br /&gt;
::*will be addressing one of the root causes of application software insecurity.&lt;br /&gt;
&lt;br /&gt;
=== BACKGROUND ===&lt;br /&gt;
&lt;br /&gt;
'''Eric Sheridan:'''&lt;br /&gt;
&lt;br /&gt;
::*Earned a Bachelor’s of Science in Computer Science from Towson University&lt;br /&gt;
::*Graduate Student in Information Security at Johns Hopkins University&lt;br /&gt;
::*Application Security Engineer at Aspect Security&lt;br /&gt;
::*Lead of the OWASP Stinger Project and the OWASP Validation Project&lt;br /&gt;
&lt;br /&gt;
'''Goran Trajkovski, PhD:'''&lt;br /&gt;
&lt;br /&gt;
::*Has been teaching the Application Software Security course for the Computer Security undergraduate and master-level majors at TU since 2004 (TU has been a Center of Excellence in Information Assurance, designated by the NSA since 2002).&lt;br /&gt;
::*Assistant professor of Computer and Information Sciences at Towson University, and Director of its Cognitive Agency and Robotics Lab (CARoL).&lt;br /&gt;
::*Has lead curricular efforts in integrating application software security topics throughout the Computer Science and Computer Information Sciences curriculum&lt;br /&gt;
::*12 years of full time teaching experience in higher ed.&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17413</id>
		<title>OWASP Spring Of Code 2007 Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17413"/>
				<updated>2007-03-26T10:14:27Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains project Applications to the [[OWASP_Spring_Of_Code_2007]]&lt;br /&gt;
&lt;br /&gt;
'''If you want to apply for a SpoC 007 sponsorship you HAVE TO USE THIS PAGE for your application'''&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_Spring_Of_Code_2007#How_To_Participate]] for what do to one you completed your Application&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proposed template:''' {for longer proposals, in addition to these details you can create a PDF}:&lt;br /&gt;
&lt;br /&gt;
== {Your first name or Alias} - {Project name} ==&lt;br /&gt;
Please remember that projects will be selected and funded based on how well they meet the [[OWASP_Spring_Of_Code_2007_:_Selection|Selection Criteria]].&lt;br /&gt;
&lt;br /&gt;
You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic.  We strongly suggest that you include the following information in your proposal.&lt;br /&gt;
&lt;br /&gt;
* Your educational and professional background&lt;br /&gt;
&lt;br /&gt;
* Application security experience and accomplishments&lt;br /&gt;
&lt;br /&gt;
* Participation and leadership in open communities&lt;br /&gt;
&lt;br /&gt;
* The opportunity, challenges, issues or need your proposal addresses&lt;br /&gt;
&lt;br /&gt;
* Objectives or ways in which you will meet the goal(s)&lt;br /&gt;
&lt;br /&gt;
* Specific activities and who will carry out these activities&lt;br /&gt;
&lt;br /&gt;
* Specific deliverables and a rough project schedule so we can track progress&lt;br /&gt;
&lt;br /&gt;
* Long-term vision for the project&lt;br /&gt;
&lt;br /&gt;
* Any other reasons why you and your project should be selected&lt;br /&gt;
&lt;br /&gt;
== Buanzo - Enigform: Firefox Addon for OpenPGP signing of HTTP requests ==&lt;br /&gt;
&lt;br /&gt;
I am a 25 year old Independent security consultant from Buenos Aires, Argentina, that has contributed to the world of&lt;br /&gt;
information systems security since 1994, when BBSes and Linux still lived together.&lt;br /&gt;
&lt;br /&gt;
A quick search for buanzo on google [http://www.google.com/search?hl=en&amp;amp;q=buanzo&amp;amp;btnG=Google+Search] will provide all necessary details about my professional and community background. For comprobable experience, you could also check my Rent a Coder profile.[http://www.rentacoder.com/RentACoder/SoftwareCoders/showBioInfo.asp?lngAuthorId=735204].&lt;br /&gt;
&lt;br /&gt;
In my free time I like playing with my Punk-Pop band [http://www.purevolume.com/futurabandapunkpop], Futurabanda. [http://www.futurabanda.com.ar], and maintaining my Restaurants, Wines and Recipes site. [http://www.vivamoslavida.com.ar]. I have to admit that my first priorities are my beloved son [http://www.fotolog.com/buanzo] and my wonderful wife [http://www.fotolog.com/buanzo].&lt;br /&gt;
&lt;br /&gt;
=== Accomplishments ===&lt;br /&gt;
&lt;br /&gt;
I've contributed scripts, fixes and translations to the Nmap project. I've also acted as Expert Contributor for SANS TOP-20 2004, 2005 and 2006. I've developed &lt;br /&gt;
tools that can be found in Freshmeat, like mprl (a getty enhancement to allow remote logins from the login: prompt of the console). I've also written&lt;br /&gt;
the Unix chapter of the OISSG's Information Systems Security Assessment Framework, v0.1 [http://www.oissg.org/content/view/71/71/]. I'm currently writing&lt;br /&gt;
an Internet Draft to be proposed for RFC regarding Enigform.&lt;br /&gt;
&lt;br /&gt;
=== Community ===&lt;br /&gt;
&lt;br /&gt;
I run the official 2600 meetings site for Argentina [http://www.2600.com/meetings/pages.html], I've been proposed, but I refused, for President of the Argentinian Free Software group called SOLAR [www.solar.org.ar]. I'm an active member of the FLOSS community since 1996, having written articles in magazines http://www.net-security.org/dl/articles/Detecting_and_Understanding_rootkits.txt, made TV, radio&lt;br /&gt;
and newspaper appearances [http://codigoabierto.bitacoras.com/archivos/2005/04/01/buanzo-hacks] and led different security research groups of Spain, Mexico and Argentina. Currently I contribute time thorugh my sites, forums and blogs,&lt;br /&gt;
answering questions in mailing lists and helping coordinate some local LUGs. I do also manager the Linux Counter for Argentina [http://counter.li.org/reports/place.php?place=AR].&lt;br /&gt;
&lt;br /&gt;
=== My Project ===&lt;br /&gt;
&lt;br /&gt;
Enigform [http://enigform.mozdev.org] is a Firefox extension that enhances HTTP with OpenPGP functionality. It digitally signs outgoing HTTP requests so that a web server can authenticate the identity and data of the incoming request. It is a Web Security tool because it can, if correctly implemented as any OpenPGP based technology, render man in the middle attacks useless. I think OpenPGP already speaks for itself regarding eMail. Imagine the same benefits for http and web applications. I think Enigform can fit into the OWASP Validation Project [http://www.owasp.org/index.php/Category:OWASP_Validation_Project].&lt;br /&gt;
&lt;br /&gt;
Enigform is the reference implementation of the Internet Draft I'm working on, in discussion with members of the IETF's OpenPGP Working Group.&lt;br /&gt;
&lt;br /&gt;
Some simple PHP code is enough to make a web application Enigform-aware [http://enigformtest.buanzo.com.ar]. The Smutty PHP MVC Framework already supports Enigform [http://smutty.pu-gh.com/demo/enigform].&lt;br /&gt;
&lt;br /&gt;
=== Long Term ===&lt;br /&gt;
&lt;br /&gt;
Have the Draft be proposed as a Standards Track RFC document, have Enigform support directly in Apache and IIS, and port Enigform to other browsers&lt;br /&gt;
and/or programming languages, and also provide OpenPGP De/Encryption support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why should I be selected ===&lt;br /&gt;
&lt;br /&gt;
I have the experience, security awareness and means to make this project THE web security project of the decade. I am a respected member of the&lt;br /&gt;
international security community, and I firmly believe Enigform is my greatest idea so far.&lt;br /&gt;
&lt;br /&gt;
== Eoin Keary - Code review Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the OWASP Code review guide during this period.&lt;br /&gt;
The code review guide was started by me in 2005 and has much information on reviewing code for common vulnerabilities. It is frequently accessed (looking at the stats on the OWASP site) and therefore is useful to practitioners. &lt;br /&gt;
&lt;br /&gt;
I believe the code review guide is an integral part of the OWASP BOK (Body of Knowledge). Ensuring secure development is key to secure applications and code review is of paramount importance in this domain.&lt;br /&gt;
&lt;br /&gt;
There are many sections still to be added and more to be readjusted and rewritten to reflect the current state of the security world.&lt;br /&gt;
Much needs to be written on Web 2.0 technologies and distributed B2B technologies such as Webservices.&lt;br /&gt;
 &lt;br /&gt;
The Code review process and procedure needs also to be covered. A guide to establishing a mature code review process also needs to be done.&lt;br /&gt;
Code review methodologies also need to be discussed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the code review guide:&lt;br /&gt;
* Add additional areas relating to the code review process such as:&lt;br /&gt;
** Benefits and pitfalls&lt;br /&gt;
** Methodology&lt;br /&gt;
** The code review process&lt;br /&gt;
*** Transactional analysis&lt;br /&gt;
*** Managing the code review process&lt;br /&gt;
*** Assigning risk to findings&lt;br /&gt;
&lt;br /&gt;
** Technical guides&lt;br /&gt;
*** Language specific best practice &lt;br /&gt;
*** Java &lt;br /&gt;
*** .NET &lt;br /&gt;
*** PHP &lt;br /&gt;
*** MySQL &lt;br /&gt;
*** Stored Procs &lt;br /&gt;
*** C/C++ &lt;br /&gt;
&lt;br /&gt;
** Code review by vulnerability:&lt;br /&gt;
*** Reviewing Code for Buffer Overruns and Overflows &lt;br /&gt;
*** Reviewing Code for OS Injection&lt;br /&gt;
*** Reviewing Code for SQL Injection&lt;br /&gt;
*** Reviewing Code for Data Validation&lt;br /&gt;
*** Reviewing code for XSS issues&lt;br /&gt;
*** Reviewing Code for Error Handling&lt;br /&gt;
*** Reviewing Code for Logging Issues&lt;br /&gt;
*** Reviewing The Secure Code Environment&lt;br /&gt;
*** Reviewing code for Authorization Issues&lt;br /&gt;
*** Reviewing code for Authentication Issues&lt;br /&gt;
*** Reviewing code for Session Integrity&lt;br /&gt;
*** Reviewing code for Cross Site Request Forgery&lt;br /&gt;
*** Reviewing code for Cryptography implementation issues&lt;br /&gt;
*** Reviewing code Dangerous HTTP Methods (Deployment)&lt;br /&gt;
*** Race Conditions &lt;br /&gt;
&lt;br /&gt;
The areas of code are structured giving a brief explanation, the anti-pattern (vulnerable pattern to look for) and a suggested fix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I used to head up the code review team as part of the application security group in fidelity investments and have 5+ years of the secure code review process. &lt;br /&gt;
I also was the lead of the Testing guide until V2 was published via the Autumn of Code. &lt;br /&gt;
&lt;br /&gt;
I have always  delivered any work I have volunteered for on time. &lt;br /&gt;
 &lt;br /&gt;
I have been involved in OWASP projects for 2/3 years now and have always been an active contributor.&lt;br /&gt;
&lt;br /&gt;
== Paolo Perego - Owasp Orizon Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
Owasp Orizon [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project] Project born in 2006 as answer to the lack of common engine and library usable by opensource code review related tools.&lt;br /&gt;
&lt;br /&gt;
I'm proposing that, during the Spring of Code 2007 period, I'll complete static analisys API and java source code enforment objects.&lt;br /&gt;
&lt;br /&gt;
Sometimes a complete code review approach is not suitable for most customers who wants to harden their code which is being approaching release stage. For such a reason, I started writing Java objects that embeds most of the security checks against common web vulnerabilities (XSS, SQL injection, Session handling, ...) so that source code can be hardened with a small effort in terms of code rewriting.&lt;br /&gt;
&lt;br /&gt;
I do believe that a common set of API and a common safe coding best practices library is one of the most important goals to bring application security to the developers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Completing the static code review API section&lt;br /&gt;
* improving programming language to XML translator&lt;br /&gt;
* improving security best practices code review scan library&lt;br /&gt;
* improving secure coding fashion best practices library&lt;br /&gt;
* writing the pattern matching scan using the aformentioned libraries&lt;br /&gt;
Writing the java source code enforment objects&lt;br /&gt;
* writing an object to handle form data values to avoid XSS&lt;br /&gt;
* writing an object to handle form data values to avoid SQL Injection&lt;br /&gt;
* writing an object to handle HttpRequest and HttpSession objects&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
Owasp Orizon is the first Owasp project I'm involved in. I'm also contributor of Owasp Italian chapter managed by Matteo Meucci and I'm talking at various speeches about application security and safe coding best practices.&lt;br /&gt;
&lt;br /&gt;
I'm a security consultant working in ethical hacking and we're approaching code review and safe topics right now.&lt;br /&gt;
I'm a developer too so I understand also the &amp;quot;dark side&amp;quot; of the problem developing code with security in mind.&lt;br /&gt;
&lt;br /&gt;
I work using the &amp;quot;release early release often&amp;quot; paradigm so to be concrete and let other people having something usable to work with.&lt;br /&gt;
&lt;br /&gt;
== Sebastien Deleersnyder - OWASP Education Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
This Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences. &lt;br /&gt;
&lt;br /&gt;
Web Application Security Education and Awareness is needed throughout the entire organization, each area and level of organizations have specific needs and requirements regarding education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience. &lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Currently the project goals are to create Educational Tracks: &lt;br /&gt;
* Complete the [[OWASP Education Presentation|consolidation page of OWASP presentations]] performed in the past&lt;br /&gt;
* A &amp;quot;Web Application Security Primer&amp;quot; Track for beginners (4 hours) &lt;br /&gt;
* A &amp;quot;What developers should know on Web Application Security&amp;quot; Track for developers (4 hours) &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''': &lt;br /&gt;
I started the successful Belgian Chapter 3 years ago and have actively contributed to OWASP since then. I also co-organized the European conference last year in Belgium.&lt;br /&gt;
&lt;br /&gt;
This is the first separate project that I started, originating from a local demand to set up educational tracks for people that are new to Web Application Security. There are literally hundreds of presentations and an enormous amount of information on the OWASP web site. The goal of this project is to restructure pieces of that information in reusable modules that can be combined in educational tracks. It is my believe that awareness is an important cornerstone of building secure web applications, and this project will actively support that.&lt;br /&gt;
&lt;br /&gt;
If we are granted Spoc 007 participation, I will be sharing the budget with all active participants. This will be an extra motivation for project participation. I will reinvest my part in the project to set up a web conferencing / web casting solution to be used to disseminate the project results and make them available for later use.&lt;br /&gt;
&lt;br /&gt;
* '''More details''': &lt;br /&gt;
The detailed [[OWASP Education Project Roadmap|road map]] can be found here.&lt;br /&gt;
The SpoC 007 goal is to finish Sub Goals 1, 2, 3 and 4. If time permits we can start with sub goal 5.&lt;br /&gt;
&lt;br /&gt;
== Subere - OWASP JBroFuzz Project ==&lt;br /&gt;
&lt;br /&gt;
==== Overview ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. The purpose of this application is to provide a single, portable application that offers stable cross-platform network protocol fuzzing capabilities. At the same time, JBroFuzz attempts to keep the User Interface (UI) as intuitive as possible.&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ==== &lt;br /&gt;
&lt;br /&gt;
As seen by the emphasis given on the subject of fuzzing in the 2007 Testing Guide (v2), network protocol fuzzing serves as a fundamental cornerstone of application security testing. For this, many different categories and types of fuzzing have been defined.&lt;br /&gt;
&lt;br /&gt;
==== Objectives ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz needs to expand and grow in order to cover network fuzzing in a more complete manner. Its modular implementation allows for the addtion of new functionality by means of independent tabs. The key tabs proposed to be added during the spring of code 2007 are (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab'''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab'''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing using HTTPClient'''&lt;br /&gt;
* '''Blind SQL Injection Fuzzing Tab'''&lt;br /&gt;
&lt;br /&gt;
At the same time, the following existing tabs need to be updated and made more robust (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs'''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue'''&lt;br /&gt;
* '''Update Generators file format'''&lt;br /&gt;
* '''Include SOAP and XML fuzzing'''&lt;br /&gt;
&lt;br /&gt;
This expansion process relates to stabilising code that is presently included in JBroFuzz, thus allowing it to run for extensive periods of time (24h+) as well as adding more functionality in terms of the three new tabs.&lt;br /&gt;
&lt;br /&gt;
==== Deliverables ==== &lt;br /&gt;
&lt;br /&gt;
Based on the above, the new code elements that will be added are as follows:&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab:''' ''Provide the ability to enumerate e-mails from newsgroups without breaching google automated search rules''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab:''' ''Provide the ability to enumerate NTLM as well as brute over HTTP/S NTLM.''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing:''' ''Implement a fuzzing tab utilising HTTPClient from Jakarta that will also allow for multi-threading''&lt;br /&gt;
* '''Blind SQL Fuzzing Tab''' ''Implement a tab that extracts information from a blind SQL injection point identified on web server over HTTP/HTTPS.''&lt;br /&gt;
&lt;br /&gt;
For updating existing code elements that require a partial rewrite, the following areas of focus are presented in detail: &lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs:''' ''Provide the ability to graph fuzzing results during a particular session run. This will give the ability to integrate and pickup potential fuzzing patterns.''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue:''' ''Update the code of the sniffing panel in order to handle threaded agents in a more memory efficient way.''&lt;br /&gt;
* '''Update Generators file format:''' ''Update the generators file format to allow for the parsing and creation of recursive generators.''&lt;br /&gt;
* '''Include SOAP and XML fuzzing:''' ''Include an up to date list of SOAP and XML fuzzing templates.''&lt;br /&gt;
&lt;br /&gt;
Overall, the above two lists of changes should provide sufficient complexity and output for the spring of code 2007, forming a challenging implementation project.&lt;br /&gt;
&lt;br /&gt;
==== Background ==== &lt;br /&gt;
&lt;br /&gt;
In its short life, the OWASP JBroFuzz Project has attracted the interest of the online security community with a total of appr. 5000 downloads in the last months. &lt;br /&gt;
&lt;br /&gt;
Coming from a strong java background (5+ years) I decided to implement and release JBroFuzz in order to initially simplify penetrations testing processes that relate to web application and network protocol fuzzing.&lt;br /&gt;
&lt;br /&gt;
I see the spring of code 2007 as a unique opportunity to industrialise network protocol fuzzing (and in particular HTTP/S fuzzing) within a single application, residing within OWASP.&lt;br /&gt;
&lt;br /&gt;
==== Why should JBroFuzz be sponsored? ==== &lt;br /&gt;
&lt;br /&gt;
Centralising fuzzing resources into one application that has the ability to handle network protocol fuzzing over HTTP and HTTPS in a simple and intuitive manner forms an area of focus that should not be dismissed in building secure software applications.&lt;br /&gt;
&lt;br /&gt;
Keep the code platform independent adds a huge advantage. &lt;br /&gt;
&lt;br /&gt;
Receving an OWASP grant from the spring of code 2007 will trigger a share in the budget with all active participants depending on their level of involvement. This will be a direct function of the number of tabs and/or user functionality that they have assisted in implementing.&lt;br /&gt;
&lt;br /&gt;
== Joshua Perrymon - OWASP LiveCD Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the second version of the OWASP LiveCD during this period.&lt;br /&gt;
The first version of the LiveCD is now available and include many of the current OWASP documents and tools. I believe the LiveCD is one of the best mediums to promote OWASP tools and documentation. It is portable and already being used by thousands of security proffesionals to perform application testing and training. &lt;br /&gt;
&lt;br /&gt;
In the current state the CD is stable and contains a lot of tools. However, this is just the beginning. There is a LOT of work that needs to be completed. The entire CD experience needs to be branded using OWASP graphics. This shouls start with the boot screen and carry all the way through to the icons and desktop graphics. The CD should also inlcude the wiki and ALL the tools developed for OWASP.&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the LiveCD:&lt;br /&gt;
* Complete OWASP branding&lt;br /&gt;
* Add OWASP wiki&lt;br /&gt;
* Add encryption capabilities&lt;br /&gt;
* Add more OWASP tools&lt;br /&gt;
* Add more pen-test tools such as;&lt;br /&gt;
 VOIP, RFID, BlueTooth, Wireless, etc..&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I had the idea of the LiveCD about a year ago and have worked very hard to get the first version developed. This was driven by my vision to make all of the OWASP tools available on a portable medium. The main difference in the OWASP liveCD vs. other live CDs is going to be the regularity of updates. If sponsorship can be obtained the CD could be updated on a monthly basis. Not once a year like other liveCDs. The CD will also include specialty tools and documentation to perform VOIP, RFID,Bluetooth, and wireless security assessments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Mark Curphey – A Better Web Security Evaluation Criteria ==&lt;br /&gt;
&lt;br /&gt;
'''Problem''' &lt;br /&gt;
PCI DSS is attracting a lot of criticism for a lot of valid reasons. &lt;br /&gt;
 &lt;br /&gt;
http://securitybuddha.com/2007/03/23/the-problems-with-the-pci-data-security-standard-part-1/&lt;br /&gt;
&lt;br /&gt;
http://blogs.csoonline.com/node/210&lt;br /&gt;
&lt;br /&gt;
http://www.computerweekly.com/blogs/stuart_king/2007/03/more-on-pci---the-audit-guide.html&lt;br /&gt;
&lt;br /&gt;
The list is of course long and not appropriate here……&lt;br /&gt;
&lt;br /&gt;
'''Solution and Deliverables'''&lt;br /&gt;
As opposed to continuing to say what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. This project would address the;&lt;br /&gt;
&lt;br /&gt;
'''Standard''' &lt;br /&gt;
*The technical things people should care about&lt;br /&gt;
*The operational  / management things people should care about&lt;br /&gt;
'''Business Model''' &lt;br /&gt;
*A complete framework for certification (ongoing) and implementation (including certifying auditors, ongoing validation etc)&lt;br /&gt;
&lt;br /&gt;
Note:  This is no trivial task to get right. I would need to ensure I can commit to completing the work to a good quality. I think this will take at least 2 months from start to finish to complete but I think is very important for the industry and for potentially for OWASP.  I wanted to gauge the interest by first posting this.&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17412</id>
		<title>OWASP Spring Of Code 2007 Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17412"/>
				<updated>2007-03-26T10:12:14Z</updated>
		
		<summary type="html">&lt;p&gt;Mcurphey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains project Applications to the [[OWASP_Spring_Of_Code_2007]]&lt;br /&gt;
&lt;br /&gt;
'''If you want to apply for a SpoC 007 sponsorship you HAVE TO USE THIS PAGE for your application'''&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_Spring_Of_Code_2007#How_To_Participate]] for what do to one you completed your Application&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proposed template:''' {for longer proposals, in addition to these details you can create a PDF}:&lt;br /&gt;
&lt;br /&gt;
== {Your first name or Alias} - {Project name} ==&lt;br /&gt;
Please remember that projects will be selected and funded based on how well they meet the [[OWASP_Spring_Of_Code_2007_:_Selection|Selection Criteria]].&lt;br /&gt;
&lt;br /&gt;
You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic.  We strongly suggest that you include the following information in your proposal.&lt;br /&gt;
&lt;br /&gt;
* Your educational and professional background&lt;br /&gt;
&lt;br /&gt;
* Application security experience and accomplishments&lt;br /&gt;
&lt;br /&gt;
* Participation and leadership in open communities&lt;br /&gt;
&lt;br /&gt;
* The opportunity, challenges, issues or need your proposal addresses&lt;br /&gt;
&lt;br /&gt;
* Objectives or ways in which you will meet the goal(s)&lt;br /&gt;
&lt;br /&gt;
* Specific activities and who will carry out these activities&lt;br /&gt;
&lt;br /&gt;
* Specific deliverables and a rough project schedule so we can track progress&lt;br /&gt;
&lt;br /&gt;
* Long-term vision for the project&lt;br /&gt;
&lt;br /&gt;
* Any other reasons why you and your project should be selected&lt;br /&gt;
&lt;br /&gt;
== Buanzo - Enigform: Firefox Addon for OpenPGP signing of HTTP requests ==&lt;br /&gt;
&lt;br /&gt;
I am a 25 year old Independent security consultant from Buenos Aires, Argentina, that has contributed to the world of&lt;br /&gt;
information systems security since 1994, when BBSes and Linux still lived together.&lt;br /&gt;
&lt;br /&gt;
A quick search for buanzo on google [http://www.google.com/search?hl=en&amp;amp;q=buanzo&amp;amp;btnG=Google+Search] will provide all necessary details about my professional and community background. For comprobable experience, you could also check my Rent a Coder profile.[http://www.rentacoder.com/RentACoder/SoftwareCoders/showBioInfo.asp?lngAuthorId=735204].&lt;br /&gt;
&lt;br /&gt;
In my free time I like playing with my Punk-Pop band [http://www.purevolume.com/futurabandapunkpop], Futurabanda. [http://www.futurabanda.com.ar], and maintaining my Restaurants, Wines and Recipes site. [http://www.vivamoslavida.com.ar]. I have to admit that my first priorities are my beloved son [http://www.fotolog.com/buanzo] and my wonderful wife [http://www.fotolog.com/buanzo].&lt;br /&gt;
&lt;br /&gt;
=== Accomplishments ===&lt;br /&gt;
&lt;br /&gt;
I've contributed scripts, fixes and translations to the Nmap project. I've also acted as Expert Contributor for SANS TOP-20 2004, 2005 and 2006. I've developed &lt;br /&gt;
tools that can be found in Freshmeat, like mprl (a getty enhancement to allow remote logins from the login: prompt of the console). I've also written&lt;br /&gt;
the Unix chapter of the OISSG's Information Systems Security Assessment Framework, v0.1 [http://www.oissg.org/content/view/71/71/]. I'm currently writing&lt;br /&gt;
an Internet Draft to be proposed for RFC regarding Enigform.&lt;br /&gt;
&lt;br /&gt;
=== Community ===&lt;br /&gt;
&lt;br /&gt;
I run the official 2600 meetings site for Argentina [http://www.2600.com/meetings/pages.html], I've been proposed, but I refused, for President of the Argentinian Free Software group called SOLAR [www.solar.org.ar]. I'm an active member of the FLOSS community since 1996, having written articles in magazines http://www.net-security.org/dl/articles/Detecting_and_Understanding_rootkits.txt, made TV, radio&lt;br /&gt;
and newspaper appearances [http://codigoabierto.bitacoras.com/archivos/2005/04/01/buanzo-hacks] and led different security research groups of Spain, Mexico and Argentina. Currently I contribute time thorugh my sites, forums and blogs,&lt;br /&gt;
answering questions in mailing lists and helping coordinate some local LUGs. I do also manager the Linux Counter for Argentina [http://counter.li.org/reports/place.php?place=AR].&lt;br /&gt;
&lt;br /&gt;
=== My Project ===&lt;br /&gt;
&lt;br /&gt;
Enigform [http://enigform.mozdev.org] is a Firefox extension that enhances HTTP with OpenPGP functionality. It digitally signs outgoing HTTP requests so that a web server can authenticate the identity and data of the incoming request. It is a Web Security tool because it can, if correctly implemented as any OpenPGP based technology, render man in the middle attacks useless. I think OpenPGP already speaks for itself regarding eMail. Imagine the same benefits for http and web applications. I think Enigform can fit into the OWASP Validation Project [http://www.owasp.org/index.php/Category:OWASP_Validation_Project].&lt;br /&gt;
&lt;br /&gt;
Enigform is the reference implementation of the Internet Draft I'm working on, in discussion with members of the IETF's OpenPGP Working Group.&lt;br /&gt;
&lt;br /&gt;
Some simple PHP code is enough to make a web application Enigform-aware [http://enigformtest.buanzo.com.ar]. The Smutty PHP MVC Framework already supports Enigform [http://smutty.pu-gh.com/demo/enigform].&lt;br /&gt;
&lt;br /&gt;
=== Long Term ===&lt;br /&gt;
&lt;br /&gt;
Have the Draft be proposed as a Standards Track RFC document, have Enigform support directly in Apache and IIS, and port Enigform to other browsers&lt;br /&gt;
and/or programming languages, and also provide OpenPGP De/Encryption support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why should I be selected ===&lt;br /&gt;
&lt;br /&gt;
I have the experience, security awareness and means to make this project THE web security project of the decade. I am a respected member of the&lt;br /&gt;
international security community, and I firmly believe Enigform is my greatest idea so far.&lt;br /&gt;
&lt;br /&gt;
== Eoin Keary - Code review Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the OWASP Code review guide during this period.&lt;br /&gt;
The code review guide was started by me in 2005 and has much information on reviewing code for common vulnerabilities. It is frequently accessed (looking at the stats on the OWASP site) and therefore is useful to practitioners. &lt;br /&gt;
&lt;br /&gt;
I believe the code review guide is an integral part of the OWASP BOK (Body of Knowledge). Ensuring secure development is key to secure applications and code review is of paramount importance in this domain.&lt;br /&gt;
&lt;br /&gt;
There are many sections still to be added and more to be readjusted and rewritten to reflect the current state of the security world.&lt;br /&gt;
Much needs to be written on Web 2.0 technologies and distributed B2B technologies such as Webservices.&lt;br /&gt;
 &lt;br /&gt;
The Code review process and procedure needs also to be covered. A guide to establishing a mature code review process also needs to be done.&lt;br /&gt;
Code review methodologies also need to be discussed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the code review guide:&lt;br /&gt;
* Add additional areas relating to the code review process such as:&lt;br /&gt;
** Benefits and pitfalls&lt;br /&gt;
** Methodology&lt;br /&gt;
** The code review process&lt;br /&gt;
*** Transactional analysis&lt;br /&gt;
*** Managing the code review process&lt;br /&gt;
*** Assigning risk to findings&lt;br /&gt;
&lt;br /&gt;
** Technical guides&lt;br /&gt;
*** Language specific best practice &lt;br /&gt;
*** Java &lt;br /&gt;
*** .NET &lt;br /&gt;
*** PHP &lt;br /&gt;
*** MySQL &lt;br /&gt;
*** Stored Procs &lt;br /&gt;
*** C/C++ &lt;br /&gt;
&lt;br /&gt;
** Code review by vulnerability:&lt;br /&gt;
*** Reviewing Code for Buffer Overruns and Overflows &lt;br /&gt;
*** Reviewing Code for OS Injection&lt;br /&gt;
*** Reviewing Code for SQL Injection&lt;br /&gt;
*** Reviewing Code for Data Validation&lt;br /&gt;
*** Reviewing code for XSS issues&lt;br /&gt;
*** Reviewing Code for Error Handling&lt;br /&gt;
*** Reviewing Code for Logging Issues&lt;br /&gt;
*** Reviewing The Secure Code Environment&lt;br /&gt;
*** Reviewing code for Authorization Issues&lt;br /&gt;
*** Reviewing code for Authentication Issues&lt;br /&gt;
*** Reviewing code for Session Integrity&lt;br /&gt;
*** Reviewing code for Cross Site Request Forgery&lt;br /&gt;
*** Reviewing code for Cryptography implementation issues&lt;br /&gt;
*** Reviewing code Dangerous HTTP Methods (Deployment)&lt;br /&gt;
*** Race Conditions &lt;br /&gt;
&lt;br /&gt;
The areas of code are structured giving a brief explanation, the anti-pattern (vulnerable pattern to look for) and a suggested fix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I used to head up the code review team as part of the application security group in fidelity investments and have 5+ years of the secure code review process. &lt;br /&gt;
I also was the lead of the Testing guide until V2 was published via the Autumn of Code. &lt;br /&gt;
&lt;br /&gt;
I have always  delivered any work I have volunteered for on time. &lt;br /&gt;
 &lt;br /&gt;
I have been involved in OWASP projects for 2/3 years now and have always been an active contributor.&lt;br /&gt;
&lt;br /&gt;
== Paolo Perego - Owasp Orizon Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
Owasp Orizon [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project] Project born in 2006 as answer to the lack of common engine and library usable by opensource code review related tools.&lt;br /&gt;
&lt;br /&gt;
I'm proposing that, during the Spring of Code 2007 period, I'll complete static analisys API and java source code enforment objects.&lt;br /&gt;
&lt;br /&gt;
Sometimes a complete code review approach is not suitable for most customers who wants to harden their code which is being approaching release stage. For such a reason, I started writing Java objects that embeds most of the security checks against common web vulnerabilities (XSS, SQL injection, Session handling, ...) so that source code can be hardened with a small effort in terms of code rewriting.&lt;br /&gt;
&lt;br /&gt;
I do believe that a common set of API and a common safe coding best practices library is one of the most important goals to bring application security to the developers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Completing the static code review API section&lt;br /&gt;
* improving programming language to XML translator&lt;br /&gt;
* improving security best practices code review scan library&lt;br /&gt;
* improving secure coding fashion best practices library&lt;br /&gt;
* writing the pattern matching scan using the aformentioned libraries&lt;br /&gt;
Writing the java source code enforment objects&lt;br /&gt;
* writing an object to handle form data values to avoid XSS&lt;br /&gt;
* writing an object to handle form data values to avoid SQL Injection&lt;br /&gt;
* writing an object to handle HttpRequest and HttpSession objects&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
Owasp Orizon is the first Owasp project I'm involved in. I'm also contributor of Owasp Italian chapter managed by Matteo Meucci and I'm talking at various speeches about application security and safe coding best practices.&lt;br /&gt;
&lt;br /&gt;
I'm a security consultant working in ethical hacking and we're approaching code review and safe topics right now.&lt;br /&gt;
I'm a developer too so I understand also the &amp;quot;dark side&amp;quot; of the problem developing code with security in mind.&lt;br /&gt;
&lt;br /&gt;
I work using the &amp;quot;release early release often&amp;quot; paradigm so to be concrete and let other people having something usable to work with.&lt;br /&gt;
&lt;br /&gt;
== Sebastien Deleersnyder - OWASP Education Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
This Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences. &lt;br /&gt;
&lt;br /&gt;
Web Application Security Education and Awareness is needed throughout the entire organization, each area and level of organizations have specific needs and requirements regarding education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience. &lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Currently the project goals are to create Educational Tracks: &lt;br /&gt;
* Complete the [[OWASP Education Presentation|consolidation page of OWASP presentations]] performed in the past&lt;br /&gt;
* A &amp;quot;Web Application Security Primer&amp;quot; Track for beginners (4 hours) &lt;br /&gt;
* A &amp;quot;What developers should know on Web Application Security&amp;quot; Track for developers (4 hours) &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''': &lt;br /&gt;
I started the successful Belgian Chapter 3 years ago and have actively contributed to OWASP since then. I also co-organized the European conference last year in Belgium.&lt;br /&gt;
&lt;br /&gt;
This is the first separate project that I started, originating from a local demand to set up educational tracks for people that are new to Web Application Security. There are literally hundreds of presentations and an enormous amount of information on the OWASP web site. The goal of this project is to restructure pieces of that information in reusable modules that can be combined in educational tracks. It is my believe that awareness is an important cornerstone of building secure web applications, and this project will actively support that.&lt;br /&gt;
&lt;br /&gt;
If we are granted Spoc 007 participation, I will be sharing the budget with all active participants. This will be an extra motivation for project participation. I will reinvest my part in the project to set up a web conferencing / web casting solution to be used to disseminate the project results and make them available for later use.&lt;br /&gt;
&lt;br /&gt;
* '''More details''': &lt;br /&gt;
The detailed [[OWASP Education Project Roadmap|road map]] can be found here.&lt;br /&gt;
The SpoC 007 goal is to finish Sub Goals 1, 2, 3 and 4. If time permits we can start with sub goal 5.&lt;br /&gt;
&lt;br /&gt;
== Subere - OWASP JBroFuzz Project ==&lt;br /&gt;
&lt;br /&gt;
==== Overview ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. The purpose of this application is to provide a single, portable application that offers stable cross-platform network protocol fuzzing capabilities. At the same time, JBroFuzz attempts to keep the User Interface (UI) as intuitive as possible.&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ==== &lt;br /&gt;
&lt;br /&gt;
As seen by the emphasis given on the subject of fuzzing in the 2007 Testing Guide (v2), network protocol fuzzing serves as a fundamental cornerstone of application security testing. For this, many different categories and types of fuzzing have been defined.&lt;br /&gt;
&lt;br /&gt;
==== Objectives ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz needs to expand and grow in order to cover network fuzzing in a more complete manner. Its modular implementation allows for the addtion of new functionality by means of independent tabs. The key tabs proposed to be added during the spring of code 2007 are (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab'''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab'''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing using HTTPClient'''&lt;br /&gt;
* '''Blind SQL Injection Fuzzing Tab'''&lt;br /&gt;
&lt;br /&gt;
At the same time, the following existing tabs need to be updated and made more robust (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs'''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue'''&lt;br /&gt;
* '''Update Generators file format'''&lt;br /&gt;
* '''Include SOAP and XML fuzzing'''&lt;br /&gt;
&lt;br /&gt;
This expansion process relates to stabilising code that is presently included in JBroFuzz, thus allowing it to run for extensive periods of time (24h+) as well as adding more functionality in terms of the three new tabs.&lt;br /&gt;
&lt;br /&gt;
==== Deliverables ==== &lt;br /&gt;
&lt;br /&gt;
Based on the above, the new code elements that will be added are as follows:&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab:''' ''Provide the ability to enumerate e-mails from newsgroups without breaching google automated search rules''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab:''' ''Provide the ability to enumerate NTLM as well as brute over HTTP/S NTLM.''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing:''' ''Implement a fuzzing tab utilising HTTPClient from Jakarta that will also allow for multi-threading''&lt;br /&gt;
* '''Blind SQL Fuzzing Tab''' ''Implement a tab that extracts information from a blind SQL injection point identified on web server over HTTP/HTTPS.''&lt;br /&gt;
&lt;br /&gt;
For updating existing code elements that require a partial rewrite, the following areas of focus are presented in detail: &lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs:''' ''Provide the ability to graph fuzzing results during a particular session run. This will give the ability to integrate and pickup potential fuzzing patterns.''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue:''' ''Update the code of the sniffing panel in order to handle threaded agents in a more memory efficient way.''&lt;br /&gt;
* '''Update Generators file format:''' ''Update the generators file format to allow for the parsing and creation of recursive generators.''&lt;br /&gt;
* '''Include SOAP and XML fuzzing:''' ''Include an up to date list of SOAP and XML fuzzing templates.''&lt;br /&gt;
&lt;br /&gt;
Overall, the above two lists of changes should provide sufficient complexity and output for the spring of code 2007, forming a challenging implementation project.&lt;br /&gt;
&lt;br /&gt;
==== Background ==== &lt;br /&gt;
&lt;br /&gt;
In its short life, the OWASP JBroFuzz Project has attracted the interest of the online security community with a total of appr. 5000 downloads in the last months. &lt;br /&gt;
&lt;br /&gt;
Coming from a strong java background (5+ years) I decided to implement and release JBroFuzz in order to initially simplify penetrations testing processes that relate to web application and network protocol fuzzing.&lt;br /&gt;
&lt;br /&gt;
I see the spring of code 2007 as a unique opportunity to industrialise network protocol fuzzing (and in particular HTTP/S fuzzing) within a single application, residing within OWASP.&lt;br /&gt;
&lt;br /&gt;
==== Why should JBroFuzz be sponsored? ==== &lt;br /&gt;
&lt;br /&gt;
Centralising fuzzing resources into one application that has the ability to handle network protocol fuzzing over HTTP and HTTPS in a simple and intuitive manner forms an area of focus that should not be dismissed in building secure software applications.&lt;br /&gt;
&lt;br /&gt;
Keep the code platform independent adds a huge advantage. &lt;br /&gt;
&lt;br /&gt;
Receving an OWASP grant from the spring of code 2007 will trigger a share in the budget with all active participants depending on their level of involvement. This will be a direct function of the number of tabs and/or user functionality that they have assisted in implementing.&lt;br /&gt;
&lt;br /&gt;
== Joshua Perrymon - OWASP LiveCD Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the second version of the OWASP LiveCD during this period.&lt;br /&gt;
The first version of the LiveCD is now available and include many of the current OWASP documents and tools. I believe the LiveCD is one of the best mediums to promote OWASP tools and documentation. It is portable and already being used by thousands of security proffesionals to perform application testing and training. &lt;br /&gt;
&lt;br /&gt;
In the current state the CD is stable and contains a lot of tools. However, this is just the beginning. There is a LOT of work that needs to be completed. The entire CD experience needs to be branded using OWASP graphics. This shouls start with the boot screen and carry all the way through to the icons and desktop graphics. The CD should also inlcude the wiki and ALL the tools developed for OWASP.&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the LiveCD:&lt;br /&gt;
* Complete OWASP branding&lt;br /&gt;
* Add OWASP wiki&lt;br /&gt;
* Add encryption capabilities&lt;br /&gt;
* Add more OWASP tools&lt;br /&gt;
* Add more pen-test tools such as;&lt;br /&gt;
 VOIP, RFID, BlueTooth, Wireless, etc..&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I had the idea of the LiveCD about a year ago and have worked very hard to get the first version developed. This was driven by my vision to make all of the OWASP tools available on a portable medium. The main difference in the OWASP liveCD vs. other live CDs is going to be the regularity of updates. If sponsorship can be obtained the CD could be updated on a monthly basis. Not once a year like other liveCDs. The CD will also include specialty tools and documentation to perform VOIP, RFID,Bluetooth, and wireless security assessments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Mark Curphey – A Better Web Security Evaluation Criteria'''&lt;br /&gt;
&lt;br /&gt;
'''Problem''' &lt;br /&gt;
PCI DSS is attracting a lot of criticism for a lot of valid reasons.  &lt;br /&gt;
http://securitybuddha.com/2007/03/23/the-problems-with-the-pci-data-security-standard-part-1/&lt;br /&gt;
&lt;br /&gt;
http://blogs.csoonline.com/node/210&lt;br /&gt;
&lt;br /&gt;
http://www.computerweekly.com/blogs/stuart_king/2007/03/more-on-pci---the-audit-guide.html&lt;br /&gt;
&lt;br /&gt;
The list is of course long and not appropriate here……&lt;br /&gt;
&lt;br /&gt;
'''Solution and Deliverables'''&lt;br /&gt;
As opposed to continuing to say what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. This project would address the;&lt;br /&gt;
&lt;br /&gt;
'''Standard''' &lt;br /&gt;
-The technical things people should care about&lt;br /&gt;
-The operational  / management things people should care about&lt;br /&gt;
'''Business Model''' &lt;br /&gt;
-A complete framework for certification (ongoing) and implementation (including certifying auditors, ongoing validation etc)&lt;br /&gt;
&lt;br /&gt;
Note:  This is no trivial task to get right. I would need to ensure I can commit to completing the work to a good quality. I think this will take at least 2 months from start to finish to complete but I think is very important for the industry and for potentially for OWASP.  I wanted to gauge the interest by first posting this.&lt;/div&gt;</summary>
		<author><name>Mcurphey</name></author>	</entry>

	</feed>