<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michael+Hendrickx</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michael+Hendrickx"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Michael_Hendrickx"/>
		<updated>2026-04-26T00:34:44Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Michael_Hendrickx&amp;diff=218606</id>
		<title>User:Michael Hendrickx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Michael_Hendrickx&amp;diff=218606"/>
				<updated>2016-07-06T22:56:09Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Software Engineer working for a large software company.  I used to be a security consultant, doing projects that are often security assessments, source code reviews and software development.  For the past decade, I've been quite active in Web Application Security Assessments.&lt;br /&gt;
&lt;br /&gt;
I live in Vancouver, BC now.&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Pinning_Cheat_Sheet&amp;diff=218605</id>
		<title>Pinning Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Pinning_Cheat_Sheet&amp;diff=218605"/>
				<updated>2016-07-06T22:54:53Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: fixing typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
The [[Pinning Cheat Sheet]] is a technical guide to implementing certificate and public key pinning as discussed at the Virginia chapter's presentation [[Media:Securing-Wireless-Channels-in-the-Mobile-Space.ppt|Securing Wireless Channels in the Mobile Space]]. This guide is focused on providing clear, simple, actionable guidance for securing the channel in a hostile environment where actors could be malicious and the conference of trust a liability.&lt;br /&gt;
&lt;br /&gt;
A verbose article is available at [[Certificate_and_Public_Key_Pinning|Certificate and Public Key Pinning]]. The article includes additional topics, such as Alternatives to Pinning, Ephemeral Keys, Pinning Gaps, Revocation, and X509 Validation.&lt;br /&gt;
&lt;br /&gt;
== What's the problem? ==&lt;br /&gt;
&lt;br /&gt;
Users, developers, and applications expect end-to-end security on their secure channels, but some secure channels are not meeting the expectation. Specifically, channels built using well known protocols such as VPN, SSL, and TLS can be vulnerable to a number of attacks.&lt;br /&gt;
&lt;br /&gt;
== What Is Pinning? ==&lt;br /&gt;
&lt;br /&gt;
Pinning is the process of associating a host with their ''expected'' X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. If more than one certificate or public key is acceptable, then the program holds a ''pinset'' (taking from [https://developers.google.com/events/io/sessions/gooio2012/107/ Jon Larimer and Kenny Root Google I/O talk]). In this case, the advertised identity must match one of the elements in the pinset.&lt;br /&gt;
&lt;br /&gt;
A host or service's certificate or public key can be added to an application at development time, or it can be added upon first encountering the certificate or public key. The former - adding at development time - is preferred since ''preloading'' the certificate or public key ''out of band'' usually means the attacker cannot taint the pin.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
You should pin anytime you want to be relatively certain of the remote host's identity or when operating in a hostile environment. Since one or both are almost always true, you should probably pin all the time.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Whitelist? ===&lt;br /&gt;
&lt;br /&gt;
If you are working for an organization which practices &amp;quot;egress filtering&amp;quot; as part of a Data Loss Prevention (DLP) strategy, you will likely encounter ''Interception Proxies''. I like to refer to these things as '''&amp;quot;good&amp;quot; bad guys''' (as opposed to '''&amp;quot;bad&amp;quot; bad guys''') since both break end-to-end security and we can't tell them apart. In this case, '''do not''' offer to whitelist the interception proxy since it defeats your security goals. Add the interception proxy's public key to your pinset after being '''instructed''' to do so by the folks in Risk Acceptance.&lt;br /&gt;
&lt;br /&gt;
=== How Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
The idea is to re-use the exiting protocols and infrastructure, but use them in a hardened manner. For re-use, a program would keep doing the things it used to do when establishing a secure connection.&lt;br /&gt;
&lt;br /&gt;
To harden the channel, the program would would take advantage of the &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback offered by a library, framework or platform. In the callback, the program would verify the remote host's identity by validating its certificate or public key.&lt;br /&gt;
&lt;br /&gt;
== What Should Be Pinned? ==&lt;br /&gt;
&lt;br /&gt;
The first thing to decide is what should be pinned. For this choice, you have two options: you can (1) pin  the certificate; or (2) pin the public key. If you choose public keys, you have two additional choices: (a) pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt;; or (b) pin one of the concrete types such as &amp;lt;tt&amp;gt;RSAPublicKey&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;DSAPublicKey&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[File:random-org-der-dump.png|thumb| 100px |subjectPublicKeyInfo]]The three choices are explained below in more detail. I would encourage you to pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt; because it has the public parameters (such as &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; for an RSA public key) '''and''' contextual information such as an algorithm and OID. The context will help you keep your bearings at times, and the figure to the right shows the additional information available.&lt;br /&gt;
&lt;br /&gt;
=== Certificate ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-cert.png|thumb|right|100px|Certificate]] The certificate is easiest to pin. You can fetch the certificate out of band for the website, have the IT folks email your company certificate to you, use &amp;lt;tt&amp;gt;openssl s_client&amp;lt;/tt&amp;gt; to retrieve the certificate etc. At runtime, you retrieve the website or server's certificate in the callback. Within the callback, you compare the retrieved certificate with the certificate embedded within the program. If the comparison fails, then fail the method or function. &lt;br /&gt;
&lt;br /&gt;
There is a downside to pinning a certificate. If the site rotates its certificate on a regular basis, then your application would need to be updated regularly. For example, Google rotates its certificates, so you will need to update your application about once a month (if it depended on Google services). Even though Google rotates its certificates, the underlying public keys (within the certificate) remain static.&lt;br /&gt;
&lt;br /&gt;
=== Public Key ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-pubkey.png|thumb|right|100px|Public Key]] Public key pinning is more flexible but a little trickier due to the extra steps necessary to extract the public key from a certificate. As with a certificate, the program checks the extracted public key with its embedded copy of the public key.&lt;br /&gt;
&lt;br /&gt;
There are two downsides to public key pinning. First, it's harder to work with keys (versus certificates) since you must extract the key from the certificate. Extraction is a minor inconvenience in Java and .Net, buts it's uncomfortable in Cocoa/CocoaTouch and OpenSSL. Second, the key is static and may violate key rotation policies.&lt;br /&gt;
&lt;br /&gt;
=== Hashing ===&lt;br /&gt;
&lt;br /&gt;
While the three choices above used DER encoding, its also acceptable to use a hash of the information. In fact, the original sample programs were written using digested certificates and public keys. The samples were changed to allow a programmer to inspect the objects with tools like &amp;lt;tt&amp;gt;dumpasn1&amp;lt;/tt&amp;gt; and other ASN.1 decoders.&lt;br /&gt;
&lt;br /&gt;
Hashing also provides three additional benefits. First, hashing allows you to anonymize a certificate or public key. This might be important if you application is concerned about leaking information during decompilation and re-engineering. Second, a digested certificate fingerprint is often available as a native API for many libraries, so its convenient to use.&lt;br /&gt;
&lt;br /&gt;
Finally, an organization might want to supply a reserve (or back-up) identity in case the primary identity is compromised. Hashing ensures your adversaries do not see the reserved certificate or public key in advance of its use. In fact, Google's IETF draft ''websec-key-pinning'' uses the technique.&lt;br /&gt;
&lt;br /&gt;
== Examples of Pinning ==&lt;br /&gt;
&lt;br /&gt;
This section discusses certificate and public key pinning in Android Java, iOS, .Net, and OpenSSL. Code has been omitted for brevity, but the key points for the platform are highlighted. All programs attempt to connect to [https://www.random.org random.org] and fetch bytes (Dr. Mads Haahr participates in AOSP's pinning program, so the site should have a static key). The programs enjoy a pre-existing relationship with the site (more correctly, ''a priori'' knowledge), so they include a copy of the site's public key and pin the identity on the key.&lt;br /&gt;
&lt;br /&gt;
=== Android ===&lt;br /&gt;
&lt;br /&gt;
This example is using the concept from [https://developer.android.com/training/articles/security-ssl.html#UnknownCa developer.android.com unknown CA implementation document]. Basically you can teach HttpsURLConnection to trust a specific set of CAs.&lt;br /&gt;
&lt;br /&gt;
Download: [https://github.com/riramar/pubkey-pin-android Android app pubkey-pin-android]&lt;br /&gt;
&lt;br /&gt;
=== iOS ===&lt;br /&gt;
&lt;br /&gt;
An open-source SSL pinning library for iOS and OS X was released at Black Hat 2015, which provides an easy-to-use API for deploying pinning within an App: https://github.com/datatheorem/TrustKit .&lt;br /&gt;
&lt;br /&gt;
Otherwise and when using NSURLConnection, iOS pinning is performed through a &amp;lt;tt&amp;gt;NSURLConnectionDelegate&amp;lt;/tt&amp;gt;. The delegate must implement &amp;lt;tt&amp;gt;connection:canAuthenticateAgainstProtectionSpace:&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;. Within &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;, the delegate must call &amp;lt;tt&amp;gt;SecTrustEvaluate&amp;lt;/tt&amp;gt; to perform customary X509 checks.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-ios.zip|iOS sample program]].&lt;br /&gt;
&lt;br /&gt;
=== .Net ===&lt;br /&gt;
&lt;br /&gt;
.Net pinning can be achieved by using &amp;lt;tt&amp;gt;ServicePointManager&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-dotnet.zip|.Net sample program]].&lt;br /&gt;
&lt;br /&gt;
=== OpenSSL ===&lt;br /&gt;
&lt;br /&gt;
Pinning can occur at one of two places with OpenSSL. First is the user supplied &amp;lt;tt&amp;gt;verify_callback&amp;lt;/tt&amp;gt;. Second is after the connection is established via &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt;. Either method will allow you to access the peer's certificate.&lt;br /&gt;
&lt;br /&gt;
Though OpenSSL performs the X509 checks, you must fail the connection and tear down the socket on error. By design, a server that does not supply a certificate will result in &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt; with a '''NULL''' certificate. To check the result of the customary verification: (1) you must call &amp;lt;tt&amp;gt;SSL_get_verify_result&amp;lt;/tt&amp;gt; and verify the return code is &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt;; and (2) you must call &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt; and verify the certificate is '''non-NULL'''.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* OWASP [[Injection_Theory|Injection Theory]]&lt;br /&gt;
* OWASP [[Data_Validation|Data Validation]]&lt;br /&gt;
* OWASP [[Transport_Layer_Protection_Cheat_Sheet|Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc1421.txt RFC 1421 (PEM Encoding)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4648.txt RFC 4648 (Base16, Base32, and Base64 Encodings)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5280.txt RFC 5280 (Internet X.509, PKIX)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc3279.txt RFC 3279 (PKI, X509 Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4055.txt RFC 4055 (PKI, X509 Additional Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc2246.txt RFC 2246 (TLS 1.0)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4346.txt RFC 4346 (TLS 1.1)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5246.txt RFC 5246 (TLS 1.2)]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2125 PKCS#1, RSA Encryption Standard]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2128 PKCS#6, Extended-Certificate Syntax Standard]&lt;br /&gt;
&lt;br /&gt;
== Authors and Editors  ==&lt;br /&gt;
&lt;br /&gt;
* Jeffrey Walton - jeffrey, owasp.org&lt;br /&gt;
* John Steven - john, owasp.org&lt;br /&gt;
* Jim Manico - jim, owasp.org&lt;br /&gt;
* Kevin Wall - kevin, owasp.org&lt;br /&gt;
* Ricardo Iramar - ricardo.iramar@gmail.com&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Michael_Hendrickx&amp;diff=211779</id>
		<title>User:Michael Hendrickx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Michael_Hendrickx&amp;diff=211779"/>
				<updated>2016-03-25T19:00:10Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am an Information Security Professional working for a software company.  I used to be a consultant in the Middle East, doing projects that are often security assessments, source code reviews and software development.  For the past decade, I've been quite active in Web Application Security Assessments, and in a previous life, I even made a few open source tools.&lt;br /&gt;
I live in Vancouver, BC now.&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=181300</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=181300"/>
				<updated>2014-08-28T06:15:26Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=181299</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=181299"/>
				<updated>2014-08-28T06:14:38Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: Tarek Naja&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: Michael Hendrickx&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=181298</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=181298"/>
				<updated>2014-08-28T05:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: Tarek Naja&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: Michael Hendrickx&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak Ammar Almarzooqi - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is Tarek Naja - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Double_Free&amp;diff=176277</id>
		<title>Double Free</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Double_Free&amp;diff=176277"/>
				<updated>2014-06-02T19:17:11Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Double free errors occur when free() is called more than once with the same memory address as an argument.&lt;br /&gt;
&lt;br /&gt;
Calling free() twice on the same value can lead to memory leak. When a program calls free() twice with the same argument, the program's memory management data structures become corrupted and could allow a malicious user to write values in arbitrary memory spaces. This corruption can cause the program to crash or, in some circumstances, alter the execution flow.  By overwriting particular registers or memory spaces, an attacker can trick the program into executing code of his/her own choosing, often resulting in an interactive shell with elevated .&lt;br /&gt;
&lt;br /&gt;
When a buffer is free()'d, a linked list of free buffers is read to rearrange and combine the chunks of free memory (to be able to allocate larger buffers in the future).  These chunks are laid out in a double linked list which points to previous and next chunks.  Unlinking an unused buffer (which is what happens when free() is called) could allow an attacker to write arbitrary values in memory; essentially overwriting valuable registers, calling shellcode from it's own buffer.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
* Talk about the [[OWASP Risk Rating Methodology|factors]] that make this vulnerability likely or unlikely to actually happen&lt;br /&gt;
* Discuss the technical impact of a successful exploit of this vulnerability&lt;br /&gt;
* Consider the likely [business impacts] of a successful attack&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
The following code shows a simple example of a double free vulnerability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	char* ptr = (char*)malloc (SIZE);&lt;br /&gt;
	...&lt;br /&gt;
	if (abrt) {&lt;br /&gt;
	  free(ptr);&lt;br /&gt;
	}&lt;br /&gt;
	...&lt;br /&gt;
	free(ptr);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Double free vulnerabilities have three common (and sometimes overlapping) causes:&lt;br /&gt;
&lt;br /&gt;
* Error conditions and other exceptional circumstances &lt;br /&gt;
* Usage of the memory space after it's freed.&lt;br /&gt;
* Confusion over which part of the program is responsible for freeing the memory &lt;br /&gt;
&lt;br /&gt;
Although some double free vulnerabilities are not much more complicated than the previous example, most are spread out across hundreds of lines of code or even different files. Programmers seem particularly susceptible to freeing global variables more than once.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Heap_overflow]]&lt;br /&gt;
* [[Buffer_overflow_attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Control 1]]&lt;br /&gt;
* [[Control 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Technical Impacts]]==&lt;br /&gt;
&lt;br /&gt;
* [[Technical Impact 1]]&lt;br /&gt;
* [[Technical Impact 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|add links&lt;br /&gt;
&lt;br /&gt;
In addition, one should classify vulnerability based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Vulnerability]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authorization Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authentication Vulnerability&lt;br /&gt;
&lt;br /&gt;
Concurrency Vulnerability&lt;br /&gt;
&lt;br /&gt;
Configuration Vulnerability&lt;br /&gt;
&lt;br /&gt;
Cryptographic Vulnerability&lt;br /&gt;
&lt;br /&gt;
Encoding Vulnerability&lt;br /&gt;
&lt;br /&gt;
Error Handling Vulnerability&lt;br /&gt;
&lt;br /&gt;
Input Validation Vulnerability&lt;br /&gt;
&lt;br /&gt;
Logging and Auditing Vulnerability&lt;br /&gt;
&lt;br /&gt;
Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Code Quality Vulnerability]]&lt;br /&gt;
[[Category:Implementation]]&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Michael_Hendrickx&amp;diff=176276</id>
		<title>User:Michael Hendrickx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Michael_Hendrickx&amp;diff=176276"/>
				<updated>2014-06-02T19:07:23Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am an Information Security Professional working on projects primarily in Europe and the Middle East.  These projects are often security assessments, source code reviews and software development.  For the past decade, I've been quite active in Web Application Security Assessments, and in a previous life, I even made a few open source tools.&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Double_Free&amp;diff=176243</id>
		<title>Double Free</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Double_Free&amp;diff=176243"/>
				<updated>2014-06-02T12:47:28Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Hendrickx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Double free errors occur when free() is called more than once with the same memory address as an argument.&lt;br /&gt;
&lt;br /&gt;
Calling free() twice on the same value can lead to memory leak. When a program calls free() twice with the same argument, the program's memory management data structures become corrupted and could allow a malicious user to write values in arbitrary memory spaces. This corruption can cause the program to crash or, in some circumstances, alter the execution flow.  By overwriting particular registers or memory spaces, an attacker can trick the program into executing code of his/her own choosing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
* Talk about the [[OWASP Risk Rating Methodology|factors]] that make this vulnerability likely or unlikely to actually happen&lt;br /&gt;
* Discuss the technical impact of a successful exploit of this vulnerability&lt;br /&gt;
* Consider the likely [business impacts] of a successful attack&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
The following code shows a simple example of a double free vulnerability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	char* ptr = (char*)malloc (SIZE);&lt;br /&gt;
	...&lt;br /&gt;
	if (abrt) {&lt;br /&gt;
	  free(ptr);&lt;br /&gt;
	}&lt;br /&gt;
	...&lt;br /&gt;
	free(ptr);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Double free vulnerabilities have two common (and sometimes overlapping) causes:&lt;br /&gt;
&lt;br /&gt;
* Error conditions and other exceptional circumstances &lt;br /&gt;
* Confusion over which part of the program is responsible for freeing the memory &lt;br /&gt;
&lt;br /&gt;
Although some double free vulnerabilities are not much more complicated than the previous example, most are spread out across hundreds of lines of code or even different files. Programmers seem particularly susceptible to freeing global variables more than once.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Attack 1]]&lt;br /&gt;
* [[Attack 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Control 1]]&lt;br /&gt;
* [[Control 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Technical Impacts]]==&lt;br /&gt;
&lt;br /&gt;
* [[Technical Impact 1]]&lt;br /&gt;
* [[Technical Impact 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|add links&lt;br /&gt;
&lt;br /&gt;
In addition, one should classify vulnerability based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Vulnerability]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authorization Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authentication Vulnerability&lt;br /&gt;
&lt;br /&gt;
Concurrency Vulnerability&lt;br /&gt;
&lt;br /&gt;
Configuration Vulnerability&lt;br /&gt;
&lt;br /&gt;
Cryptographic Vulnerability&lt;br /&gt;
&lt;br /&gt;
Encoding Vulnerability&lt;br /&gt;
&lt;br /&gt;
Error Handling Vulnerability&lt;br /&gt;
&lt;br /&gt;
Input Validation Vulnerability&lt;br /&gt;
&lt;br /&gt;
Logging and Auditing Vulnerability&lt;br /&gt;
&lt;br /&gt;
Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Code Quality Vulnerability]]&lt;br /&gt;
[[Category:Implementation]]&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Michael Hendrickx</name></author>	</entry>

	</feed>