<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michael+Tracy</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michael+Tracy"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Michael_Tracy"/>
		<updated>2026-04-26T08:08:00Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=141789</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=141789"/>
				<updated>2013-01-03T22:29:23Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: Jan 10 updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 10th, 2013 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 10th, 2013''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''Tell your friends!''' Many people just don't hear about these meetings and most people I ask say they heard about it from a friend or co-worker. &lt;br /&gt;
&lt;br /&gt;
'''This is event is completely free and open to everyone, but you must RSVP.''' Please RSVP at the following EventBrite page so that security can let you into the building: https://owaspchicago.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. &lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments @ Cafeteria -  Light snacks. If you want food, you can bring your own and eat here. Food is not allowed in the auditorium.&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks! @ Auditorium&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
This time, we will be doing short-format talks -- about 25-30 minutes each. There will be time for Q&amp;amp;A.&lt;br /&gt;
&lt;br /&gt;
* '''Common Ruby on Rails Pitfalls''' by Matt Konda and Jonathan Claudius&lt;br /&gt;
&lt;br /&gt;
* '''Automation Domination''' by Brandon Spruth:&lt;br /&gt;
&lt;br /&gt;
''You have either bought some really expensive static and/or dynamic web scanning tools, or you are looking to go on the &amp;quot;cheap&amp;quot; with some free ones.  The next decision you will need to make will be either running these in scanning tools manually or dominate with automation!  Our discussion will explore some popular options on how to best automate the implementation of your scanning tools, with Continuous Integration, OWASP Projects, and to Normalizing your scanning metrics/findings/vulnerabilities.&lt;br /&gt;
''&lt;br /&gt;
&lt;br /&gt;
* '''Static analysis, or CSP, or Python evented stuff (one of them, not all)''' by Ben Toews&lt;br /&gt;
&lt;br /&gt;
* '''Basic Analysis of iOS applications''' by John Downey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/images/8/88/Secure_Password_Storage_%40OWASPChicago.pdf]Secure Password Storage'''&lt;br /&gt;
John Steven, Cigital&lt;br /&gt;
&lt;br /&gt;
This talk discusses the pros and cons of the current practices such as salted-hashes, adaptive hashes and proposes an alternative solution for strengthening these existing practices.  The talk will discuss the cryptographic properties of the current practices, but does not require a PhD in mathematics to understand the details.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.offenseindepth.com/slides/Stripe_OWASP.pdf]Stripe CTF 2.0; A Walkthrough'''&lt;br /&gt;
Jeff Jarmoc, Dell SecureWorks&lt;br /&gt;
Zack Fasel, Dubsec Labs&lt;br /&gt;
&lt;br /&gt;
In this presentation, we walk through our solutions to Stripe CTF 2.0.  Focus is on how we discovered the vulnerabilities, and how we went about finding and exploiting them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=141460</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=141460"/>
				<updated>2012-12-26T02:06:20Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: Jan 10 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 10th, 2013 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 10th, 2013''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''This is event is completely free and open to everyone, but you must RSVP.''' Please RSVP at the following EventBrite page so that security can let you into the building: https://owaspchicago.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The format for this meeting will consist of 20-minute lightning talks. We are still short on talks (no pun intended) -- if you have a talk in mind, please [mailto:vitaly.mclain+owasp@gmail.com let me know].'''&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments @ Cafeteria -  Light snacks. If you want food, you can bring your own and eat here. Food is not allowed in the auditorium.&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks! @ Auditorium&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
TBA. &lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/images/8/88/Secure_Password_Storage_%40OWASPChicago.pdf]Secure Password Storage'''&lt;br /&gt;
John Steven, Cigital&lt;br /&gt;
&lt;br /&gt;
This talk discusses the pros and cons of the current practices such as salted-hashes, adaptive hashes and proposes an alternative solution for strengthening these existing practices.  The talk will discuss the cryptographic properties of the current practices, but does not require a PhD in mathematics to understand the details.&lt;br /&gt;
&lt;br /&gt;
'''[http://www.offenseindepth.com/slides/Stripe_OWASP.pdf]Stripe CTF 2.0; A Walkthrough'''&lt;br /&gt;
Jeff Jarmoc, Dell SecureWorks&lt;br /&gt;
Zack Fasel, Dubsec Labs&lt;br /&gt;
&lt;br /&gt;
In this presentation, we walk through our solutions to Stripe CTF 2.0.  Focus is on how we discovered the vulnerabilities, and how we went about finding and exploiting them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=137175</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=137175"/>
				<updated>2012-10-08T02:12:51Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''This is event is completely free and open to everyone, but you must RSVP.''' Please RSVP at the following EventBrite page so that security can let you into the building: https://owaspchicago.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. &lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments @ Cafeteria -  Light snacks. If you want food, you can bring your own and eat here. Food is not allowed in the auditorium.&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks! @ Auditorium&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''10/7 update:''' We now have two talks, which should give more time for Q/A and interaction.&lt;br /&gt;
&lt;br /&gt;
'''John Steven''' on '''Secure Password Storage: Increasing Resistance to Brute Force Attacks''' -- 6:30 - 7:30pm + Q/A time&lt;br /&gt;
&lt;br /&gt;
'''Jeff Jarmoc''' and '''Zack Fasel''' on the '''Stripe CTF 2.0''' -- ~7:45 - 8:45pm + Q/A time&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=137170</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=137170"/>
				<updated>2012-10-08T01:51:19Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''This is event is completely free and open to everyone, but you must RSVP.''' Please RSVP at the following EventBrite page so that security can let you into the building: https://owaspchicago.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. &lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''10/7 update:''' We now have two talks, which should give more time for Q/A and interaction.&lt;br /&gt;
&lt;br /&gt;
'''John Steven''' on '''Secure Password Storage: Increasing Resistance to Brute Force Attacks''' -- 6:30 - 7:30pm + Q/A time&lt;br /&gt;
&lt;br /&gt;
'''Jeff Jarmoc''' and '''Zack Fasel''' on the '''Stripe CTF 2.0''' -- ~7:45 - 8:45pm + Q/A time&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=137169</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=137169"/>
				<updated>2012-10-08T01:46:27Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''This is event is completely free and open to everyone, but you must RSVP.''' Please RSVP at the following EventBrite page so that security can let you into the building: https://owaspchicago.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. &lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Oct 7th update:'' 'We now have two talks, which should give more time for Q/A and interaction.&lt;br /&gt;
&lt;br /&gt;
'''John Steven''' on '''Secure Password Storage: Increasing Resistance to Brute Force Attacks''' -- 6:30 - 7:30pm + Q/A time&lt;br /&gt;
&lt;br /&gt;
'''Jeff Jarmoc''' and '''Zack Fasel''' on the '''Stripe CTF 2.0''' -- ~7:30 - 8:30 + Q/A time&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=136300</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=136300"/>
				<updated>2012-09-22T23:57:53Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: Meeting updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''This is event is completely free and open to everyone, but you must RSVP.''' Please RSVP at the following EventBrite page so that security can let you into the building: https://owaspchicago.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. &lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Jacob Kitchel''' on '''Static nonces in an embedded digest access auth implementation''' -- 6:30 - 7:00pm&lt;br /&gt;
&lt;br /&gt;
'''John Steven''' on '''Secure Password Storage: Increasing Resistance to Brute Force Attacks''' -- 7:00 - 8:00pm&lt;br /&gt;
&lt;br /&gt;
'''Jeff Jarmoc''' and '''Zack Fasel''' on the '''Stripe CTF 2.0''' -- 8:00 - 9:00pm&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135392</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135392"/>
				<updated>2012-09-05T22:25:50Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''We are in need of speakers!''' If you have a talk, anywhere from 20min - 1hr, please let me know. [mailto:vitaly.mclain+owasp@gmail.com Send me] a quick abstract (doesn't need to be formal) so I have an idea about what you want to talk about. Even if you've asked before, please let me know again. &lt;br /&gt;
&lt;br /&gt;
Otherwise:&lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
Stay tuned to this page for more information.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
??????&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135391</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135391"/>
				<updated>2012-09-05T22:24:57Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''We are in need of speakers!''' If you have a talk, anywhere from 20min - 1hr, please let me know. [mailto:vitaly.mclain+owasp@gmail.com Send me] quick abstract (doesn't need to be formal) so I have an idea about what you want to talk about. Even if you've asked before, please let me know again. &lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
??????&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135390</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135390"/>
				<updated>2012-09-05T21:11:07Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
??????&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain+owasp@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135389</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135389"/>
				<updated>2012-09-05T21:10:37Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
??????&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135388</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=135388"/>
				<updated>2012-09-05T20:45:04Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: Editing for next meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: October 11th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''October 11th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by [http://www.morningstar.com/ Morningstar] at their [http://goo.gl/maps/wfqQ8 Chicago headquarters location] (22 West Washington Street, Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
??????&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
* [mailto:vitaly.mclain@gmail.com Vitaly McLain]&lt;br /&gt;
* Mahmood Khan&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122553</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122553"/>
				<updated>2012-01-09T04:00:29Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: Updating schedule&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 19th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 19th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP for this event''' by sending an email to [mailto:vitaly.mclain@gmail.com Vitaly McLain]. Please try to include &amp;quot;OWASP&amp;quot; in the subject, and send your name no later than 4PM on January 18th. When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Speakers''':&lt;br /&gt;
&lt;br /&gt;
* '''Abraham Kang - DOM-based XSS and output encoding'''&lt;br /&gt;
&lt;br /&gt;
An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
* '''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm'''&lt;br /&gt;
&lt;br /&gt;
Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server.&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122477</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122477"/>
				<updated>2012-01-06T21:12:39Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 19th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 19th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP for this event''' by sending an email to [mailto:vitaly.mclain@gmail.com Vitaly McLain]. Please try to include &amp;quot;OWASP&amp;quot; in the subject, and send your name no later than 4PM on January 18th. When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend.&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Speakers''':&lt;br /&gt;
&lt;br /&gt;
* Abraham Kang - DOM-based XSS and output encoding &lt;br /&gt;
* Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122476</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122476"/>
				<updated>2012-01-06T21:12:12Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 19th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 19th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP for this event''' by sending an email to [mailto:vitaly.mclain@gmail.com Vitaly McLain]. Please try to include &amp;quot;OWASP&amp;quot; in the subject, and send your name no later than 4PM on January 18th. When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks.&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Speakers''':&lt;br /&gt;
&lt;br /&gt;
* Abraham Kang - DOM-based XSS and output encoding &lt;br /&gt;
* Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122420</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122420"/>
				<updated>2012-01-06T01:45:27Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 19th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 19th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP for this event''' by sending an email to [mailto:vitaly.mclain@gmail.com Vitaly McLain]. Please try to include &amp;quot;OWASP&amp;quot; in the subject, and send your name no later than 4PM on January 18th. When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks.&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Speakers''':&lt;br /&gt;
&lt;br /&gt;
* Abraham Kang - TBA&lt;br /&gt;
* Luca Carettoni - TBA&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122412</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122412"/>
				<updated>2012-01-05T21:15:47Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: Prepping page for January announcement&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January ==&lt;br /&gt;
&lt;br /&gt;
'''Please stay tuned for an announcement of the January meeting. Anyone with questions about this meeting please contact Vitaly McLain &amp;lt;vitaly.mclain@gmail.com&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=111173</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=111173"/>
				<updated>2011-05-27T21:19:49Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== It's been a long time coming and here it is! ===&lt;br /&gt;
== Next Chapter Meeting: June 2nd, 2011 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 2nd starting at 6:00pm and running until about 8:30. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602)&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 1st to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 another round of lightning talks&lt;br /&gt;
&lt;br /&gt;
We had so much fun doing the first round of lightning talks that we're going to give it another go.&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-15 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Tom Brennan     &amp;quot;OWASP where we are... where we are going&amp;quot;&lt;br /&gt;
* Daniel Crowley  &amp;quot;Jack of all Formats&amp;quot;&lt;br /&gt;
* Kuai Hinojosa   TBD&lt;br /&gt;
* Jacob Kitchel   TBD&lt;br /&gt;
* Rafal Los       &amp;quot;This is a Talk I Pulled from My Magic Hat&amp;quot;&lt;br /&gt;
* Peter Morgan    TBD&lt;br /&gt;
* Greg Ose        TBD&lt;br /&gt;
* YOU!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=110327</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=110327"/>
				<updated>2011-05-13T13:30:40Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== It's been a long time coming and here it is! ===&lt;br /&gt;
== Next Chapter Meeting: June 2nd, 2011 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 2nd starting at 6:00pm and running until about 8:30. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602)&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 1st to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 another round of lightning talks&lt;br /&gt;
&lt;br /&gt;
We had so much fun doing the first round of lightning talks that we're going to give it another go.&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-15 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Tom Brennan     &amp;quot;OWASP where we are... where we are going&amp;quot;&lt;br /&gt;
* Daniel Crowley  &amp;quot;Jack of all Formats&amp;quot;&lt;br /&gt;
* William Cummins &amp;quot;Donald Rumsfeld is my Co-Pilot: a cautionary tale&amp;quot;&lt;br /&gt;
* Kuai Hinojosa   TBD&lt;br /&gt;
* Jacob Kitchel   TBD&lt;br /&gt;
* Rafal Los       &amp;quot;This is a Talk I Pulled from My Magic Hat&amp;quot;&lt;br /&gt;
* Peter Morgan    TBD&lt;br /&gt;
* Greg Ose        TBD&lt;br /&gt;
* YOU!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=110326</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=110326"/>
				<updated>2011-05-13T13:28:41Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== It's been a long time coming and here it is! ===&lt;br /&gt;
== Next Chapter Meeting: June 2nd, 2011 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 2nd starting at 6:00pm and running until about 8:30. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602)&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 1st to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 another round of lightning talks&lt;br /&gt;
&lt;br /&gt;
We has so much fun doing the first round of lightning talks that we're going to give it another go.&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Tom Brennan     &amp;quot;OWASP where we are... where we are going&amp;quot;&lt;br /&gt;
* Daniel Crowley  &amp;quot;Jack of all Formats&amp;quot;&lt;br /&gt;
* William Cummins &amp;quot;Donald Rumsfeld is my Co-Pilot: a cautionary tale&amp;quot;&lt;br /&gt;
* Kuai Hinojosa   TBD&lt;br /&gt;
* Jacob Kitchel   TBD&lt;br /&gt;
* Rafal Los       &amp;quot;This is a Talk I Pulled from My Magic Hat&amp;quot;&lt;br /&gt;
* Peter Morgan    TBD&lt;br /&gt;
* Greg Ose        TBD&lt;br /&gt;
* YOU!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=109375</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=109375"/>
				<updated>2011-04-21T16:29:34Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== It's been a long time coming and here it is! ===&lt;br /&gt;
== Next Chapter Meeting: June 2nd, 2011 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 2nd starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 1st to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 another round of lightning talks&lt;br /&gt;
&lt;br /&gt;
We has so much fun doing the first round of lightning talks that we're going to give it another go.&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* YOU!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=92007</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=92007"/>
				<updated>2010-10-26T21:18:30Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: November 11th, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be November 11th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm November 10th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 presentations (that may or May Not include a slide deck)&lt;br /&gt;
&lt;br /&gt;
The theme for this quarter's meeting is &amp;quot;Slides Optional, Demos Awesome&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Have a tool, technique or [censored] you can demonstrate to a crowd of information-hungry webappsec people?  Bring it in and bring it on.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Scriptable Hit Tracing and Debugging Using Nerve and Ragweed (Mike Tracy &amp;amp; Timur Duehr)&lt;br /&gt;
* &amp;quot;Teenage Mutant HTTP Headers&amp;quot; (Cory Scott)&lt;br /&gt;
* Assessing Android Apps (Mike Zusman)&lt;br /&gt;
&lt;br /&gt;
Submit ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91986</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91986"/>
				<updated>2010-10-26T14:24:54Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: November 11th, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be November 11th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm November 10th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 presentations (that may or May Not include a slide deck)&lt;br /&gt;
&lt;br /&gt;
The theme for this quarter's meeting is &amp;quot;Slides Optional, Demos Awesome&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Have a tool, technique or [censored] you can demonstrate to a crowd of information-hungry webappsec people?  Bring it in and bring it on.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Scriptable Hit Tracing and Debugging Using Nerve and Ragweed (Mike Tracy &amp;amp; Timur Duehr)&lt;br /&gt;
* &amp;quot;Teenage Mutant HTTP Headers&amp;quot; (Cory Scott)&lt;br /&gt;
* Untitled [but awesome] (Mike Zusman)&lt;br /&gt;
&lt;br /&gt;
Submit ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91985</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91985"/>
				<updated>2010-10-26T14:24:34Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: November 11th, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be November 11th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm November 10th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 presentations (that may or May Not include a slide deck)&lt;br /&gt;
&lt;br /&gt;
The theme for this quarter's meeting is &amp;quot;Slides Optional, Demos Awesome&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Have a tool, technique or [censored] you can demonstrate to a crowd of information-hungry webappsec people?  Bring it in and bring it on.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Scriptable Hit Tracing and Debugging Using Nerve and Ragweed (Mike Tracy &amp;amp; Timur Duehr)&lt;br /&gt;
* &amp;quot;Teenage MutantHTTP Headers&amp;quot; (Cory Scott)&lt;br /&gt;
* Untitled [but awesome] (Mike Zusman)&lt;br /&gt;
&lt;br /&gt;
Submit ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91466</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91466"/>
				<updated>2010-10-15T12:30:07Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: November 11th, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be November 11th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm November 10th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 presentations (that may or May Not include a slide deck)&lt;br /&gt;
&lt;br /&gt;
The theme for this quarter's meeting is &amp;quot;Slides Optional, Demos Awesome&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Have a tool, technique or [censored] you can demonstrate to a crowd of information-hungry webappsec people?  Bring it in and bring it on.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Scriptable Hit Tracing and Debugging Using Nerve and Ragweed (Matasano)&lt;br /&gt;
&lt;br /&gt;
Submit ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91465</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91465"/>
				<updated>2010-10-15T12:26:32Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: November 11th, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be November 11th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm September 20th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 presentations (that may or May Not include a slide deck)&lt;br /&gt;
&lt;br /&gt;
The theme for this quarter's meeting is &amp;quot;Slides Optional, Demos Awesome&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Have a tool, technique or [censored] you can demonstrate to a crowd of information-hungry webappsec people?  Bring it in and bring it on.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Scriptable Hit Tracing and Debugging Using Nerve and Ragweed (Matasano)&lt;br /&gt;
&lt;br /&gt;
Submit ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91464</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=91464"/>
				<updated>2010-10-15T12:26:06Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: November 11th, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be November 11th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm September 20th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 presentations (that may or May Not include a slide deck)&lt;br /&gt;
&lt;br /&gt;
The theme for this quarter's meeting is &amp;quot;Slides Optional, Demos Awesome&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Have a tool, technique or [censored] you can demonstrate to a crowd of information-hungry webappsec people?  Bring it in and bring it on.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Scriptable Debugging and Hit Tracing Using Nerve and Ragweed (Matasano)&lt;br /&gt;
&lt;br /&gt;
Submit ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84984</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84984"/>
				<updated>2010-06-16T17:24:30Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek &amp;quot;These 10 Minutes Of Crypto Could Save Your Life.&amp;quot;&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman &amp;quot;Leveraging ESAPI and Other Tools to Address the OWASP Top 10&amp;quot;&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* Jeff Jarmoc &amp;quot;Nothing Earth Shattering&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84802</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84802"/>
				<updated>2010-06-11T18:27:14Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek &amp;quot;These 10 Minutes Of Crypto Could Save Your Life.&amp;quot;&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman &amp;quot;Leveraging ESAPI and Other Tools to Address the OWASP Top 10&amp;quot;&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84799</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84799"/>
				<updated>2010-06-11T17:49:52Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek &amp;quot;These 10 Minutes Of Crypto Could Save Your Life.&amp;quot;&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman &amp;quot;Leveraging ESAPI and Other Tools to Address the OWASP Top 10&amp;quot;&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* Anurag Agarwal &amp;quot;Building a business case for Website Risk Management&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84659</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84659"/>
				<updated>2010-06-07T21:29:06Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek &amp;quot;These 10 Minutes Of Crypto Could Save Your Life.&amp;quot;&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman &amp;quot;Leveraging ESAPI and Other Tools to Address the OWASP Top 10&amp;quot;&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84617</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84617"/>
				<updated>2010-06-07T17:38:46Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek &amp;quot;These 10 Minutes Of Crypto Could Save Your Life.&amp;quot;&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84531</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84531"/>
				<updated>2010-06-06T00:43:04Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Next Chapter Meeting: June 17th, 2010 *New Location* */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP (to mike.tracy@gmail.com) no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84524</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84524"/>
				<updated>2010-06-05T11:44:29Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB? (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84523</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84523"/>
				<updated>2010-06-05T11:44:05Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 12 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84515</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84515"/>
				<updated>2010-06-04T22:46:00Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth &amp;quot;The Brandon Test: 5 Steps to Better Application Security&amp;quot;&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84485</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84485"/>
				<updated>2010-06-04T18:23:13Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
* 6:00-6:30 punch and pie&lt;br /&gt;
* 6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84478</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84478"/>
				<updated>2010-06-04T15:21:55Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00-6:30 punch and pie&lt;br /&gt;
6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Jeff Groman (TBD)&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The order will most likely go Paul (OWASP leadoff) then Clint (he has to catch a flight) then randomly select talks until we're done or until they kick us out.&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84472</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84472"/>
				<updated>2010-06-04T14:02:06Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Presentation abstracts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00-6:30 punch and pie&lt;br /&gt;
6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84471</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84471"/>
				<updated>2010-06-04T14:01:23Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00-6:30 punch and pie&lt;br /&gt;
6:30-8:30 more talks than you can shake a stick at&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list&lt;br /&gt;
* Clint Pollock &amp;quot;The State of Software Security&amp;quot;&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84340</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84340"/>
				<updated>2010-06-02T22:45:17Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Next Chapter Meeting: June 17th, 2010 *New Location* */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next Chicago chapter meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).&lt;br /&gt;
&lt;br /&gt;
Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list.&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84339</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84339"/>
				<updated>2010-06-02T22:44:30Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be June 17th 2010 at a location yet to be determined at 6pm. Please RSVP to mike.tracy@gmail.com by EOB on the 16th so we can enter your name into the venue's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list.&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84338</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84338"/>
				<updated>2010-06-02T22:44:04Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be June 17th 2010 at a location yet to be determined at 6pm. Please RSVP to mike.tracy@gmail.com by EOB on the 16th so we can enter your name into the venue's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
The meeting will be June 17th starting at 6:00pm and running until about 8:30.  Space for the meeting is being graciously provided by Morningstar at their downtown Chicago headquarters location (22 West Washington Street Chicago, IL 60602).  Please RSVP no later than 4:00pm June 16th to make sure we can get you in the building.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish on the new OWASP Top 10 list.&lt;br /&gt;
* Thomas Ptacek on an interesting subject.&lt;br /&gt;
* Bill Cummins &amp;quot;You down with OPB (Other People's Bugs)&amp;quot;&lt;br /&gt;
* Brandon Spruth (TBD)&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84253</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84253"/>
				<updated>2010-06-02T01:51:08Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be June 17th 2010 at a location yet to be determined at 6pm. Please RSVP to mike.tracy@gmail.com by EOB on the 16th so we can enter your name into the venue's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
We're hoping to meet Thursday, June 17th at a venue still to be determined.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
* Paul Petefish will give a short presentation on the new OWASP Top 10 list.&lt;br /&gt;
* Thomas Ptacek will give a short presentation on an interesting subject.&lt;br /&gt;
* &amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84234</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84234"/>
				<updated>2010-06-01T16:57:59Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Next Chapter Meeting: February 2, 2010 *New Location* */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: June 17th, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be June 17th 2010 at a location yet to be determined at 6pm. Please RSVP to mike.tracy@gmail.com by EOB on the 16th so we can enter your name into the venue's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
We're hoping to meet Thursday, June 17th at a venue still to be determined.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
Paul Petefish will give a short presentation on the new OWASP Top 10 list.&lt;br /&gt;
Thomas Ptacek will give a short presentation on an interesting subject.&lt;br /&gt;
&amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84233</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=84233"/>
				<updated>2010-06-01T16:56:01Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Tracy: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory.scott@owasp.org by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
Have a subject you can talk about in 10-20 minutes?  Have a subject you'd like to see talked about in the same span?  OWASP Chicago chapter is hosting an evening of lightning talks on the subjects you want to hear.&lt;br /&gt;
&lt;br /&gt;
We're hoping to meet Thursday, June 17th at a venue still to be determined.&lt;br /&gt;
&lt;br /&gt;
Tentatively scheduled:&lt;br /&gt;
&lt;br /&gt;
Paul Petefish will give a short presentation on the new OWASP Top 10 list.&lt;br /&gt;
Thomas Ptacek will give a short presentation on an interesting subject.&lt;br /&gt;
&amp;lt;insert your talk or subject here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Submit talks or ideas for talks to mike.tracy@gmail.com and we'll get things rolling.&lt;br /&gt;
&lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as we get submissions.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Michael Tracy</name></author>	</entry>

	</feed>