<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Peter+Magnusson</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Peter+Magnusson"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Peter_Magnusson"/>
		<updated>2026-05-16T15:11:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=205259</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=205259"/>
				<updated>2015-12-15T19:05:56Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: OWASP Gothenburg Day 2015 video/* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-12-08 Mario Heiderich - An Abusive Relationship with AngularJS – About the Security Adventures with the &amp;quot;Super-Hero&amp;quot; Framework [https://www.youtube.com/watch?v=wzrojHHyQwc video]&lt;br /&gt;
* 2015-12-08 Marie Moe - Unpatchable - Living with a vulnerable implanted device [https://www.youtube.com/watch?v=ffpkFvRZWB8 video]&lt;br /&gt;
* 2015-12-08 Martin Johns - Your Scripts in My Page - What Could Possibly Go Wrong? [https://www.youtube.com/watch?v=fILLsFDkkuQ video]&lt;br /&gt;
* 2015-12-08 Michele Orrù - Dark FairyTales from a Phisherman (Vol. III) [https://www.youtube.com/watch?v=8DJKp7nKAes video]&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd [https://youtu.be/iKPFCO1qqb8 video]&lt;br /&gt;
* 2015-10-20 Mikael Wecksten - [[Media:Android sec.pdf|Introduction to Android app security review]] [https://youtu.be/Vua9Z_8aESA video]&lt;br /&gt;
* 2015-10-20 Peter Gullberg - [[Media:OWASP Security Tapas - TrustZone, TEE and Mobile Security final.pdf|TrustZone, TEE and mobile security]] [https://youtu.be/NSBSgpD_9kw video]&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-12-08 - OWASP Gothenburg Day'''&lt;br /&gt;
See https://www.owasp.org/index.php/OWASP_Gothenburg_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202981</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202981"/>
				<updated>2015-11-02T19:34:55Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security [https://youtu.be/NSBSgpD_9kw video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd [https://youtu.be/iKPFCO1qqb8 video]&lt;br /&gt;
* 2015-10-20 Mikael Wecksten - [[Media:Android sec.pdf|Introduction to Android app security review]] [https://youtu.be/Vua9Z_8aESA video]&lt;br /&gt;
* 2015-10-20 Peter Gullberg - [[Media:OWASP Security Tapas - TrustZone, TEE and Mobile Security final.pdf|TrustZone, TEE and mobile security]] [https://youtu.be/NSBSgpD_9kw video]&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-12-08 - OWASP Gothenburg Day'''&lt;br /&gt;
See https://www.owasp.org/index.php/OWASP_Gothenburg_Day_2015&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202679</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202679"/>
				<updated>2015-10-26T20:44:03Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd [https://youtu.be/iKPFCO1qqb8 video]&lt;br /&gt;
* 2015-10-20 Mikael Wecksten - [[Media:Android sec.pdf|Introduction to Android app security review]] [https://youtu.be/Vua9Z_8aESA video]&lt;br /&gt;
* 2015-10-20 Peter Gullberg - [[Media:OWASP Security Tapas - TrustZone, TEE and Mobile Security final.pdf|TrustZone, TEE and mobile security]]&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Security_Tapas_-_TrustZone,_TEE_and_Mobile_Security_final.pdf&amp;diff=202678</id>
		<title>File:OWASP Security Tapas - TrustZone, TEE and Mobile Security final.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Security_Tapas_-_TrustZone,_TEE_and_Mobile_Security_final.pdf&amp;diff=202678"/>
				<updated>2015-10-26T20:42:33Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Trusted Execution Environment,
TrustZone and Mobile Security

OWASP Göteborg: Security Tapas, Oct-20, 2015
Peter Gullberg, Principal Engineer - Digital Banking, Gemalto

&amp;quot;TEE allows Applications to execute, process,
protect and store sensitive data in...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Trusted Execution Environment,&lt;br /&gt;
TrustZone and Mobile Security&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg: Security Tapas, Oct-20, 2015&lt;br /&gt;
Peter Gullberg, Principal Engineer - Digital Banking, Gemalto&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TEE allows Applications to execute, process,&lt;br /&gt;
protect and store sensitive data in an isolated,&lt;br /&gt;
trusted environment.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Trusted Execution Environment (TEE)&lt;br /&gt;
&lt;br /&gt;
TEE - Use Cases&lt;br /&gt;
5&lt;br /&gt;
Content Protection&lt;br /&gt;
• IP streaming&lt;br /&gt;
• DRM&lt;br /&gt;
• Key protection&lt;br /&gt;
• Content protection&lt;br /&gt;
Mobile Financial Services&lt;br /&gt;
• mBanking&lt;br /&gt;
• Online payments&lt;br /&gt;
• User authentication&lt;br /&gt;
• Transaction validation&lt;br /&gt;
Corporate/government&lt;br /&gt;
• Secure networking&lt;br /&gt;
• Secure email&lt;br /&gt;
• BYOD&lt;br /&gt;
• User authentication&lt;br /&gt;
• Data encryption&lt;br /&gt;
&lt;br /&gt;
Example of TEE enabled devices&lt;br /&gt;
&lt;br /&gt;
Architectural ways of achieving a TEE&lt;br /&gt;
&lt;br /&gt;
ARM TrustZone&lt;br /&gt;
TrustZone enables the development of separate environments&lt;br /&gt;
Rich Operating System - Normal domain&lt;br /&gt;
Trusted Execution - Secure domain&lt;br /&gt;
Both domains have the same capabilities&lt;br /&gt;
Operate in a separate memory space&lt;br /&gt;
Enables a single physical processor core to execute from both the&lt;br /&gt;
Normal world and the Secure world&lt;br /&gt;
Normal world components cannot access secure world resources&lt;br /&gt;
Cortex-A Processors&lt;br /&gt;
&lt;br /&gt;
How TrustZone works&lt;br /&gt;
10&lt;br /&gt;
Uses a “33rd bit”, signaling whether in secure mode&lt;br /&gt;
This bit is also propagated outside the system on chip (SoC)&lt;br /&gt;
Peripherals and memory are configured during startup which side&lt;br /&gt;
to belong to (normal/secure)&lt;br /&gt;
&lt;br /&gt;
ARM TrustZone: Non Secure bit&lt;br /&gt;
11&lt;br /&gt;
The memory is split in Secure and Non-secure regions&lt;br /&gt;
Non-secure (NS) bit&lt;br /&gt;
Determines if the program execution is in the Secure or Nonsecure&lt;br /&gt;
world&lt;br /&gt;
AMBA AXI bus propagates the NS bit&lt;br /&gt;
Shared memory between two worlds&lt;br /&gt;
Possible to secure peripherals&lt;br /&gt;
Screen, crypto blocks&lt;br /&gt;
Protected against software attacks&lt;br /&gt;
&lt;br /&gt;
ARM TrustZone: transition management&lt;br /&gt;
12&lt;br /&gt;
Switch between normal and secure domain&lt;br /&gt;
Monitor&lt;br /&gt;
Gatekeeper that controls migration between Normal and Secure world&lt;br /&gt;
In normal world, have both user mode and privileges mode. Same&lt;br /&gt;
for Secure world&lt;br /&gt;
Secure device drivers&lt;br /&gt;
typically run in user&lt;br /&gt;
mode&lt;br /&gt;
Cannot switch the NS&lt;br /&gt;
bit in user mode&lt;br /&gt;
Secure Monitor Call&lt;br /&gt;
SMC &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CPU boots in &amp;quot;secure&lt;br /&gt;
kernel mode&amp;quot; in ROM&lt;br /&gt;
ROM Boot loader&lt;br /&gt;
verifies signature of&lt;br /&gt;
TEE OS&lt;br /&gt;
TEE verifies signature&lt;br /&gt;
of RichOS and starts it&lt;br /&gt;
&lt;br /&gt;
Example on use case&lt;br /&gt;
securebitcoin.net&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BitCoin - example&lt;br /&gt;
16&lt;br /&gt;
SecureBitCoin.net&lt;br /&gt;
Secure management of&lt;br /&gt;
Master Secret&lt;br /&gt;
PIN-entry to access the&lt;br /&gt;
Master Secret&lt;br /&gt;
Use secure crypto&lt;br /&gt;
provided by TEE&lt;br /&gt;
Master Secret is kept&lt;br /&gt;
secure at all time&lt;br /&gt;
Malware cannot steal data,&lt;br /&gt;
or modify transactions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Trusted User Interface&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
App Deployment&lt;br /&gt;
&amp;quot;secure BitCoin&amp;quot; App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Global Platform&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202642</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202642"/>
				<updated>2015-10-25T12:45:11Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Viktor Hedberg - OWASP Security Shepherd [https://youtu.be/iKPFCO1qqb8 video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd [https://youtu.be/iKPFCO1qqb8 video]&lt;br /&gt;
* 2015-10-20 Mikael Wecksten - [[Media:Android sec.pdf|Introduction to Android app security review]] [https://youtu.be/Vua9Z_8aESA video]&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202641</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202641"/>
				<updated>2015-10-25T12:21:19Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Mikael Wecksten - Introduction to Android app security review [https://youtu.be/Vua9Z_8aESA video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten - [[Media:Android sec.pdf|Introduction to Android app security review]] [https://youtu.be/Vua9Z_8aESA video]&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202640</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202640"/>
				<updated>2015-10-25T12:10:39Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Mikael Wecksten - Introduction to Android app security review /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten - [[Media:Android sec.pdf|Introduction to Android app security review]]&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Android_sec.pdf&amp;diff=202639</id>
		<title>File:Android sec.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Android_sec.pdf&amp;diff=202639"/>
				<updated>2015-10-25T12:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Introduction to Android Security review - Mikael Wecksten
Outline
Listen
Look
Listening in
AP &amp;amp; Wireshark
Why a AP?
Any device
Easy to set up
Easy to use
Alternatives
Rooted device
Saves to PCAP
Other good stuff?
Burp!
Other standard tools for web-sec...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Introduction to Android Security review - Mikael Wecksten&lt;br /&gt;
Outline&lt;br /&gt;
Listen&lt;br /&gt;
Look&lt;br /&gt;
Listening in&lt;br /&gt;
AP &amp;amp; Wireshark&lt;br /&gt;
Why a AP?&lt;br /&gt;
Any device&lt;br /&gt;
Easy to set up&lt;br /&gt;
Easy to use&lt;br /&gt;
Alternatives&lt;br /&gt;
Rooted device&lt;br /&gt;
Saves to PCAP&lt;br /&gt;
Other good stuff?&lt;br /&gt;
Burp!&lt;br /&gt;
Other standard tools for web-sec&lt;br /&gt;
Looking in&lt;br /&gt;
Decompiling APKs&lt;br /&gt;
APK&lt;br /&gt;
Compressed folder&lt;br /&gt;
Everything needed&lt;br /&gt;
.dex file&lt;br /&gt;
dex Files&lt;br /&gt;
Dalvik&lt;br /&gt;
Bytecode&lt;br /&gt;
ART is replacing it&lt;br /&gt;
Still dex files&lt;br /&gt;
Same input bytecode&lt;br /&gt;
Jar Files&lt;br /&gt;
Compressed folder&lt;br /&gt;
.class files&lt;br /&gt;
Hardware&lt;br /&gt;
USB-WiFi Dongel:&lt;br /&gt;
Tp-link&lt;br /&gt;
TL-WN722N&lt;br /&gt;
200 kronor locally in Sweden&lt;br /&gt;
Of course other alternatives&lt;br /&gt;
As low as 100 kronor online&lt;br /&gt;
Questions?&lt;br /&gt;
Contact:&lt;br /&gt;
wecksten@student.chalmers.se&lt;br /&gt;
@wecksten&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202637</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202637"/>
				<updated>2015-10-25T11:07:56Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Fredrik Strömberg - An introduction to QubesOS [https://youtu.be/oDR6VyzimPQ video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]] [https://youtu.be/oDR6VyzimPQ video]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202636</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202636"/>
				<updated>2015-10-25T10:44:00Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Anders Rosdahl - Hands on with wifi security [https://www.youtube.com/watch?v=FkCb6VORZj4 video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]] [https://www.youtube.com/watch?v=FkCb6VORZj4 video]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202615</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202615"/>
				<updated>2015-10-24T10:15:34Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Fredrik Strömberg - An introduction to QubesOS /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - [[Media:Qubes.pdf|An introduction to QubesOS]]&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Qubes.pdf&amp;diff=202614</id>
		<title>File:Qubes.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Qubes.pdf&amp;diff=202614"/>
				<updated>2015-10-24T10:14:27Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Fredrik Strömberg - An introduction to QubesOS

Security by Correctness
Security by Isolation
Security by Obscurity

●Development started in 2010
●Made by Joanna Rutkowska et al ●Low-level security ●Blue Pill ●Xen security ●Intel TXT &amp;amp; Int...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
&lt;br /&gt;
Security by Correctness&lt;br /&gt;
Security by Isolation&lt;br /&gt;
Security by Obscurity&lt;br /&gt;
&lt;br /&gt;
●Development started in 2010&lt;br /&gt;
●Made by Joanna Rutkowska et al ●Low-level security ●Blue Pill ●Xen security ●Intel TXT &amp;amp; Intel SMM&lt;br /&gt;
&lt;br /&gt;
Windows, OSX, Linux&lt;br /&gt;
One attack can own everything&lt;br /&gt;
&lt;br /&gt;
Separate your digital life into security domains&lt;br /&gt;
&lt;br /&gt;
●sys-vpn ●router ●red ●personal ●email ●work-web&lt;br /&gt;
●chat ●mullvad-dev ●printer ●server-admin ●sys-backup ●vault ●proj-*&lt;br /&gt;
●Disposables&lt;br /&gt;
&lt;br /&gt;
Thank you!&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202602</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202602"/>
				<updated>2015-10-23T22:47:21Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: jidhage video /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]] [https://youtu.be/ercZOphipRw video]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202596</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202596"/>
				<updated>2015-10-23T21:06:29Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Mattias Jidhage - Going dark (grey) /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - [[Media:GoingGrey.pdf|Going dark (grey)]]&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:GoingGrey.pdf&amp;diff=202595</id>
		<title>File:GoingGrey.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:GoingGrey.pdf&amp;diff=202595"/>
				<updated>2015-10-23T21:04:32Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Going	Dark	(Grey)
How	to	be	pre1y	anonymous	online	
Prior	art	
• @thegrugq
– OPSEC	for	freedom	fighters	
• this.lightVersion(“hands-on”)	
• Focus	on	Gothenburg,	Sweden,	today	
– on	my	way	here	
– TIL:	never	redecorate	the	house,	arrange...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Going	Dark	(Grey)&lt;br /&gt;
How	to	be	pre1y	anonymous	online	&lt;br /&gt;
Prior	art	&lt;br /&gt;
• @thegrugq&lt;br /&gt;
– OPSEC	for	freedom	fighters	&lt;br /&gt;
• this.lightVersion(“hands-on”)	&lt;br /&gt;
• Focus	on	Gothenburg,	Sweden,	today	&lt;br /&gt;
– on	my	way	here	&lt;br /&gt;
– TIL:	never	redecorate	the	house,	arrange	two	OWASP	&lt;br /&gt;
meetups,	be	presenter	on	one	of	them	and	give	another	&lt;br /&gt;
presenta?on	for	a	customer	and	start	a	new	assignment	on	&lt;br /&gt;
the	same	week	&lt;br /&gt;
Why?	&lt;br /&gt;
• The	plumbing	is	boring	and	hard	to	get	right	&lt;br /&gt;
– pracOce	makes	perfect	&lt;br /&gt;
– you	never	know	when	you	are	going	to	need	it	&lt;br /&gt;
• 45	yo,	father	of	2,	living	in	the	suburbs,	driving	&lt;br /&gt;
a	Volvo…	&lt;br /&gt;
– not	much	1337	&lt;br /&gt;
• Responsible	disclosure	&lt;br /&gt;
– currently	seams	to	be	responsible	only	one	way	&lt;br /&gt;
Some	of	the	commandments	&lt;br /&gt;
• Never	operate	from	your	house	&lt;br /&gt;
• Keep	personal	life	and	freedom	fighOng	&lt;br /&gt;
separated	&lt;br /&gt;
– don’t	contaminate	&lt;br /&gt;
• STFU		 FAIL	&lt;br /&gt;
Architecture	&lt;br /&gt;
teh&lt;br /&gt;
Internetz&lt;br /&gt;
SITE	&lt;br /&gt;
BASE&lt;br /&gt;
MOBILE	&lt;br /&gt;
ME	&lt;br /&gt;
Challenges		&lt;br /&gt;
• TOR	and/or	VPN?	&lt;br /&gt;
• Hardware?	&lt;br /&gt;
• How	to	buy	stuff?	&lt;br /&gt;
Tor	&lt;br /&gt;
• Provides	anonymity	&lt;br /&gt;
• Anonymity	protects	you	&lt;br /&gt;
– Data	leaving	Tor	through	exit	node	is	not	&lt;br /&gt;
protected.	&lt;br /&gt;
– CorrelaOon	of	entry	and	exit?	&lt;br /&gt;
– Not	foolproof,	but	pre1y	ok	unless	you	have	&lt;br /&gt;
naOon	states	as	adversaries	&lt;br /&gt;
VPN	&lt;br /&gt;
• Provides	privacy	&lt;br /&gt;
• Privacy	protects	your	data	&lt;br /&gt;
– Tunnel	endpoint	IP	can	be	detected	&lt;br /&gt;
– VPN	provider	can	have	logs	&lt;br /&gt;
– Traffic	correlaOon?	&lt;br /&gt;
Tor	and/or	VPN	&lt;br /&gt;
• “TOR	-&amp;gt;	VPN	–	OK”		&lt;br /&gt;
– Anonymous	person	within	the	Tor	cloud	connect	to	a	VPNexit&lt;br /&gt;
on	the	internet.	&lt;br /&gt;
• Or	directly	to	your	persistence-plaiorm		&lt;br /&gt;
• Looks	like	HTTPS	locally?	&lt;br /&gt;
• “VPN	-&amp;gt;	TOR	–	GOTO	JAIL”	&lt;br /&gt;
– An	IP	connected	to	a	person	and/or	geolocaOon	connects	&lt;br /&gt;
to	the	Tor	cloud.	CommunicaOons	from	Tor	to	Internet/&lt;br /&gt;
target/plaiorm	are	monitored.	&lt;br /&gt;
• Can	you	VPN	to	Tor?	Through	your	own	server?	&lt;br /&gt;
• Running	Tor	through	a	VPN	tunnel?	&lt;br /&gt;
Tor	and/or	VPN	&lt;br /&gt;
• Prepaid	mobile	broadband	&lt;br /&gt;
– Not	from	home,	not	connected	to	me	&lt;br /&gt;
– Can	of	course	be	tracked	to	a	locaOon	&lt;br /&gt;
• VPN	&lt;br /&gt;
– An	extra	step	to	keep	ISP	eyes	away	&lt;br /&gt;
Hardware	&lt;br /&gt;
• Mobile	broadband	&lt;br /&gt;
– Prepaid	starter	kit	&lt;br /&gt;
• Amazon	plaiorm	&lt;br /&gt;
– Probably	monitored,	but	will	not	leave	trace	on	your..	&lt;br /&gt;
• Mobile	unit	&lt;br /&gt;
– Buy	a	laptop	or	use	your	old	one	&lt;br /&gt;
• Personal	Onion	Router	To	Avoid	Leo	&lt;br /&gt;
– Fail	close	and	a	fun	project	–	Raspberry	2?	&lt;br /&gt;
Money	&lt;br /&gt;
• Purchase	VPN	over	TOR	with	bitcoins&lt;br /&gt;
– Anonymous	but,	can	be	traced	&lt;br /&gt;
• don’t	mix	wallets	&lt;br /&gt;
• use	mixers	&lt;br /&gt;
• Light	&lt;br /&gt;
– Prepaid	credit	cards	&lt;br /&gt;
• Tied	to	physical	locaOon	&lt;br /&gt;
• CCTV	&lt;br /&gt;
• Purchases	are	monitored	&lt;br /&gt;
Case	study	for	lazy	and	moderately	&lt;br /&gt;
evil	ha&amp;gt;&amp;lt;&amp;gt;&amp;lt;0rz	&lt;br /&gt;
• Walk	into	7Eleven	or	Pressbyrån&lt;br /&gt;
– Buy	a	prepaid	credit	card	&lt;br /&gt;
– Buy	a	mobile	broadband	modem	&lt;br /&gt;
• ISP	starter	pack,	from	199:-	&lt;br /&gt;
• Kjell&amp;amp;Co	399:-	&lt;br /&gt;
– Use	cash	and	your	favorite	hoodie	&lt;br /&gt;
• Use	credit	card	to	order	a	VPN	&lt;br /&gt;
– and	create	an	amazon	account	&lt;br /&gt;
• Email,	cell	phone	no	&lt;br /&gt;
• Done	&lt;br /&gt;
Oh,	and	you	need	at	least	one	persona	and	a	couple	of	hacker	nicks	as	well&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202486</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202486"/>
				<updated>2015-10-21T22:02:38Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Anders Rosdahl - Hands on with wifi security /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - Going dark&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - [[Media:Hands-on with wifi security publish.pdf|Hands on with wifi security]]&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hands-on_with_wifi_security_publish.pdf&amp;diff=202485</id>
		<title>File:Hands-on with wifi security publish.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hands-on_with_wifi_security_publish.pdf&amp;diff=202485"/>
				<updated>2015-10-21T22:00:36Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Hands-on	with wifi security
OWASP	Göteborg	Security Tapas
2015-10-20	
Anders	Rosdahl
#whoami
Avarage security enthusiast
No	bleeding	edge research,	no	wall of fames,	no	cve's
Actually,	this is	me...
@rosdahl
Agenda
Wifi overview
Authentication and	enc...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hands-on	with wifi security&lt;br /&gt;
OWASP	Göteborg	Security Tapas&lt;br /&gt;
2015-10-20	&lt;br /&gt;
Anders	Rosdahl&lt;br /&gt;
#whoami&lt;br /&gt;
Avarage security enthusiast&lt;br /&gt;
No	bleeding	edge research,	no	wall of fames,	no	cve's&lt;br /&gt;
Actually,	this is	me...&lt;br /&gt;
@rosdahl&lt;br /&gt;
Agenda&lt;br /&gt;
Wifi overview&lt;br /&gt;
Authentication and	encryption&lt;br /&gt;
Attacks&lt;br /&gt;
Defence&lt;br /&gt;
Demo	/	lab&lt;br /&gt;
Wifi overview&lt;br /&gt;
Access	points	continuously	&lt;br /&gt;
send	beacons to	announce	&lt;br /&gt;
themselves&lt;br /&gt;
Clients continously probe for	&lt;br /&gt;
access	points&lt;br /&gt;
Authentication&lt;br /&gt;
Association&lt;br /&gt;
Bands,	channels and	frequencies&lt;br /&gt;
802.11 Release	year Frequency&lt;br /&gt;
(GHz)&lt;br /&gt;
Max	data	&lt;br /&gt;
transfer	rate	&lt;br /&gt;
(Mbit/s)&lt;br /&gt;
Bandwidth&lt;br /&gt;
(MHz)&lt;br /&gt;
a 1999 5	/	(3.7) 54 20&lt;br /&gt;
b 1999 2.4 11 22&lt;br /&gt;
g 2003 2.4 54 20&lt;br /&gt;
n 2009 2.4	/	5	&lt;br /&gt;
72/150	&lt;br /&gt;
(per	MIMO	&lt;br /&gt;
stream)&lt;br /&gt;
20/40&lt;br /&gt;
ac 2013 5&lt;br /&gt;
96/200/433/866&lt;br /&gt;
(per	MIMO	&lt;br /&gt;
stream)&lt;br /&gt;
20/40/80/160&lt;br /&gt;
there’s more...&lt;br /&gt;
Wireless Modes&lt;br /&gt;
Each wireless device/inteface can be	in	one of the	followingmodes.	Definitions	&lt;br /&gt;
vary.&lt;br /&gt;
Station	– also referred to	as	Client mode	or	Managed mode&lt;br /&gt;
Master	– also referred to	as	Access	Point	or	Infrastructuremode&lt;br /&gt;
Ad	hoc	– for	mesh wifi networks&lt;br /&gt;
Monitor – also referred to	as	RFMON	(Radio	Frequency MONitor).	Used&lt;br /&gt;
to	silently listen	to	wifi traffic.	An	interface	in	this mode	can capture&lt;br /&gt;
traffic without connecting to	any network.&lt;br /&gt;
Not	all	combination	of wifi cards/drivers/OS	support	all	modes..&lt;br /&gt;
Authentication and	encryption&lt;br /&gt;
• Based	on	the	RC4	stream	cipher,	which	is	effectively	broken	&lt;br /&gt;
WEP&lt;br /&gt;
• WPA – intermediate	solution	while	waiting	for	WPA2,	which	would	fix	all	&lt;br /&gt;
that	was	broken	with	WEP.	Designed	by	crytographers.&lt;br /&gt;
• PSK	or	asymmetric	key	pairs/certificates&lt;br /&gt;
• TKIP-RC4	(WPA)	/	CCMP-AES	(WPA2)&lt;br /&gt;
WPA/WPA2&lt;br /&gt;
• Provides	WPA/WPA2	password	 to	client	requiring	only	a	PIN	code&lt;br /&gt;
• Two	modes:	&lt;br /&gt;
• Push-Button-Connect&lt;br /&gt;
• 4/8	digit	PIN	code&lt;br /&gt;
WPS&lt;br /&gt;
Attacks&lt;br /&gt;
WPA/WPA2&lt;br /&gt;
1. Deauthenticate connected client(s)	with traffic injection&lt;br /&gt;
2. Capture re-authenticationhandshake&lt;br /&gt;
3. Offline word-list	or	rule-based brute force	attack	on	recorded handshake&lt;br /&gt;
WPS&lt;br /&gt;
Brute force	WPS	PIN.	In	2012	several deficienciesin	WPS	were disclosed.	E.g.	onlymax	11k	&lt;br /&gt;
vs	10M	tries is	needed since AP	acks/nacks first 4	digits.		&lt;br /&gt;
WPS	backoff/timeout	timeout	preventsbruteforcing.	Was not	ubiquitous 2012.&lt;br /&gt;
WEP&lt;br /&gt;
RC4	...&lt;br /&gt;
Offline brute force	attack	similarto	WPA	above&lt;br /&gt;
Defence – hot	security tips	for	hotspots&lt;br /&gt;
Use long	and	strong	WPA2	&lt;br /&gt;
passwords!&lt;br /&gt;
Disable WPS	on	yourrouter&lt;br /&gt;
Don’t use WEP	– obviously...&lt;br /&gt;
Use VPN	when connected to	&lt;br /&gt;
public	access	points – anyone can&lt;br /&gt;
listen&lt;br /&gt;
Be	careful about auto-connect&lt;br /&gt;
features	of devicesto	avoid&lt;br /&gt;
connecting to	rouge	access	&lt;br /&gt;
points&lt;br /&gt;
Demo/lab&lt;br /&gt;
Alfa	cards for	loan!&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202484</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202484"/>
				<updated>2015-10-21T21:58:01Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Mikael Falkvidd - Livepatching the linux kernel /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - Going dark&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - [[Media:Linux_kernel_live_patching.pdf|Livepatching the linux kernel]] [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - Hands on with wifi security&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Linux_kernel_live_patching.pdf&amp;diff=202483</id>
		<title>File:Linux kernel live patching.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Linux_kernel_live_patching.pdf&amp;diff=202483"/>
				<updated>2015-10-21T21:55:31Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Linux kernel live patching
OWASP Security Tapas 2015-10-20
Mikael Falkvidd (@mfalkvidd)
Why live patches?
● Apply fixes for severe security problems quickly and without planning
downtime - SUSE’s goal is CVSS 6 and above
● Stability fixes
● lar...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Linux kernel live patching&lt;br /&gt;
OWASP Security Tapas 2015-10-20&lt;br /&gt;
Mikael Falkvidd (@mfalkvidd)&lt;br /&gt;
Why live patches?&lt;br /&gt;
● Apply fixes for severe security problems quickly and without planning&lt;br /&gt;
downtime - SUSE’s goal is CVSS 6 and above&lt;br /&gt;
● Stability fixes&lt;br /&gt;
● large in-memory databases - saving and re-reading data from disk can take&lt;br /&gt;
hours&lt;br /&gt;
● virtualization hosts - patch hosts without affecting guests&lt;br /&gt;
● computing clusters - some calculations are hard to stop and resume&lt;br /&gt;
● large datacenters - rebooting thousands or tens of thousands of machines&lt;br /&gt;
in a controlled way without affecting business can be hard&lt;br /&gt;
kpatch&lt;br /&gt;
● From Red Hat, released publically summer of 2014&lt;br /&gt;
● 10-40 milliseconds freeze&lt;br /&gt;
● All-or-nothing&lt;br /&gt;
● No performance impact after patching&lt;br /&gt;
kGraft&lt;br /&gt;
● From SUSE, released publically in November 2014&lt;br /&gt;
● No freeze&lt;br /&gt;
● Divides processes into different universes (with/without patch)&lt;br /&gt;
● Some performance impact after patching&lt;br /&gt;
Demo 1 - patch an exploit without rebooting&lt;br /&gt;
Demo 2 - create our own patch&lt;br /&gt;
--- orig/fs/proc/meminfo.c 2015-09-28 22:27:23.720627176 +0200&lt;br /&gt;
+++ fs/proc/meminfo.c 2015-09-28 22:28:28.565031970 +0200&lt;br /&gt;
@@ -89,6 +89,7 @@&lt;br /&gt;
 * Tagged format, for easy grepping and expansion.&lt;br /&gt;
 */&lt;br /&gt;
 seq_printf(m,&lt;br /&gt;
+ &amp;quot;kpatch fungerar!\n&amp;quot;&lt;br /&gt;
 &amp;quot;MemTotal: %8lu kB\n&amp;quot;&lt;br /&gt;
 &amp;quot;MemFree: %8lu kB\n&amp;quot;&lt;br /&gt;
 &amp;quot;MemAvailable: %8lu kB\n&amp;quot;&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202482</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202482"/>
				<updated>2015-10-21T21:53:33Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Mikael Falkvidd - Livepatching the linux kernel [https://youtu.be/zy0R_S2raSM video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - Going dark&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - Livepatching the linux kernel [https://youtu.be/zy0R_S2raSM video]&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - Hands on with wifi security&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202480</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202480"/>
				<updated>2015-10-21T20:26:49Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video] /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - Going dark&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack [https://youtu.be/3KQMFR7Dv3M video]&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - Livepatching the linux kernel&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - Hands on with wifi security&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202473</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202473"/>
				<updated>2015-10-21T18:38:22Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
* 2015-10-20 Mattias Jidhage - Going dark&lt;br /&gt;
* 2015-10-20 Jonas Magazinius - Mac Hack Backup Attack&lt;br /&gt;
* 2015-10-20 Mikael Falkvidd - Livepatching the linux kernel&lt;br /&gt;
* 2015-10-20 Fredrik Strömberg - An introduction to QubesOS&lt;br /&gt;
* 2015-10-20 Anders Rosdahl - Hands on with wifi security&lt;br /&gt;
* 2015-10-20 Viktor Hedberg - OWASP Security Shepherd&lt;br /&gt;
* 2015-10-20 Mikael Wecksten  Introduction to Android app security review&lt;br /&gt;
* 2015-10-20 Peter Gullberg - TrustZone, TEE and mobile security&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202472</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=202472"/>
				<updated>2015-10-21T18:33:27Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: 2015-10-20 - Security Tapas /* OWASP Göteborg 2015 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. I styrelsen sitter Per Josefsson, Fredrik Strömberg, Anders Rosdahl, Mikael Falkvidd och Viktor Hedberg.&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2015-04-16 Adde Lindh: [[Media:DefenderEconomics.pdf|Defender Economics]]&lt;br /&gt;
* 2015-04-16 Michael Boman: [[Media: From_Malware_Analysis_to_Indications_of_Compromise.pdf|From Malware Analysis to Indications of Compromise]]&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
'''2015-10-20 - Security Tapas'''&lt;br /&gt;
&lt;br /&gt;
While preparing for OWASP Gothenburg Day we realised we need something that is quite the opposite of a giant all-day event with international speakers. We need a small and cosy down-to-earth session with local speakers. Like a hackathon but with some kind of agenda. Small demonstrations, primers on a subject or technology, a lightning talk or even a small hands on workshop. To make room for a lot of people we keep them short, aiming for 15-20 minutes for presentations with some additional room for workshops.&lt;br /&gt;
OWASP will open up the floor, while you, our community, sets the agenda and take place on stage.&lt;br /&gt;
Thanks to our sponsor ÅF we'll have a cool venue on the 16th floor and something to eat and drink.&lt;br /&gt;
Pls, send us a short title, your suggested time slot size in minutes and whether this is a workshop or not (defined by the fact that participants will require to bring some kind of equipment and will be expected to perform some kind of activity) to mattias.jidhage@owasp.org OR let us know through the ticket registration form.&lt;br /&gt;
You are of course very welcome to attend even if you don't have something to present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Going dark - Mattias Jidhage'''&lt;br /&gt;
&lt;br /&gt;
'''Mac Hack Backup Attack - Jonas Magazinius'''&lt;br /&gt;
&lt;br /&gt;
'''Livepatching the linux kernel - Mikael Falkvidd'''&lt;br /&gt;
&lt;br /&gt;
'''An introduction to QubesOS - Fredrik Strömberg'''&lt;br /&gt;
&lt;br /&gt;
'''Hands on with wifi security - Anders Rosdahl'''&lt;br /&gt;
&lt;br /&gt;
'''OWASP Security Shepherd - Viktor Hedberg'''&lt;br /&gt;
&lt;br /&gt;
'''Introduction to Android app security review - Mikael Wecksten'''&lt;br /&gt;
&lt;br /&gt;
'''TrustZone, TEE and mobile security - Peter Gullberg'''&lt;br /&gt;
&lt;br /&gt;
''' 2015-04-15 - D-FENS'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let's talk defense.&lt;br /&gt;
Offense might be a bit more fun (admit it - there is a small evil mini-me inside all of us that wants nothing but wielding the mighty power of the hack that ruled them all) but let's face it, there are only so many wrongdoing organisations with world domination aspirations that will hire you to develop attacks on company time. For most of us that wants a paycheck within security, defence is on the menu. So, how should we effectively use our company’s sparse resources to make it harder for an attacker to breach our defenses and when that inevitably happens anyway; how do we find the bad code and remove it?&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English!&lt;br /&gt;
&lt;br /&gt;
''Agenda''&lt;br /&gt;
&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Defender economics&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Search and destroy&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Andreas Lindh - Defender Economics'''&lt;br /&gt;
&lt;br /&gt;
There are a lot of preconceptions about defense, the most prevalent one probably the “defenders dilemma” in which it is stated that an attacker only needs to find one weakness to compromise a network while a defender needs to defend all of them. While this may be true in a technical sense, things become a lot more complicated once you apply real world considerations. Preconceptions like this are often the foundation on which risk management and ultimately defense strategies are based, something that has led to a number of false but generally accepted assumptions about attackers and their capabilities, and how to defend against them. This talk will discuss the capabilities, and more importantly the limitations, of different types of attackers. Using the ancient wisdom of the Teenage Mutant Ninja Turtles, the speaker will explain how knowledge of an attacker’s limitations can be leveraged to raise the cost of attack, something that will tip the scale in the defenders favor. The speaker will also explain how different defensive measures will affect different types of attackers, how they are likely to react to them, and in the end how to get them to hopefully move on to another target.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh (@addelindh) is a security analyst and engineer working for I Secure Sweden in Gothenburg, Sweden. He specializes in threat &amp;amp; vulnerability analysis, intrusion detection and generally making his clients more secure. When he's not dissecting threats or kicking some intruder off a network somewhere, he likes to write crappy Python code and make bad puns on Twitter. Andreas has previously presented his work at, among others, Black Hat USA, Virus Bulletin and 44Con.&lt;br /&gt;
&lt;br /&gt;
'''Michael Boman - Search and Destroy the unknown'''&lt;br /&gt;
&lt;br /&gt;
What do you do after realizing that you have been infected by a previously unknown sample that your antimalware vendor failed to detect, or you are unsure that you have up-to-date antimalware products on all systems in your environment? Perhaps you are not able to install antimalware on some endpoints due to regulatory restrictions. So how do you go about to detect malware that hasn’t been detected by your antimalware software? Learn how you can make use of the sources of detection you already have, like your firewall logs, to detect unknown threats on your network and help you locate and extract the malicious software causing the issue. Once you got your hands on a sample you can analyze it for artifacts the malware creates. Those artifacts, called Indicators of Compromise (IOC), can be used to detect additional malware infections on your SMB or Enterprise network using tools you might already have or can easily be acquired freely from the internet.&lt;br /&gt;
&lt;br /&gt;
Michael Boman (@mboman) is a senior malware analyst at the Malware Research Institute and has been presenting at several large security conferences including 44CON and DEEPSEC in the recent years about malware research, everything from finding malware samples to analyze suspected files at speed and on budget. Michael has been interested in malicious software since he got his own machine infected even though he followed all the best practices having his computer up-to-date with both patches and antimalware software. The fact that the only thing that notified him about the infection was the built-in Windows firewall asking if it was OK to open a port for a piece of executable. And the rest, as they say, is history. Malware Research Institute is an organization that promotes malware research, tools and techniques for aspiring and seasoned malware analysts. Malware Research Institute has a blog where they publish interesting resources for malware researchers over at http://blog.malwareresearch.institute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=191850</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=191850"/>
				<updated>2015-03-20T21:47:22Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Historiska Presentationer: PDF, video med mera. Georg Koppen and Philipp Winter: Surfing safely over the Tor anonymity network. PDF, video 1, video 2, video 3.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2015-03-19 Georg Koppen and Philipp Winter: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]] [https://www.youtube.com/watch?v=bmmAFiqOgks Video: Relays] [https://www.youtube.com/watch?v=s7vb_mjJn2M Video: TorBrowser] [https://www.youtube.com/watch?v=UhWhlm0SB-U Video: Questions and Answers]&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2015 ==&lt;br /&gt;
&lt;br /&gt;
'''2015-03-20 - Philipp and Georg's slides available'''&lt;br /&gt;
&lt;br /&gt;
Tor presentation slides: [[Media:Winter_Koppen_Tor_OWASP_20150319.pdf|Surfing safely over the Tor anonymity network]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2015-03-11 - Strengths and weaknesses of Tor, the white knight of internet anonymity '''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For those interested in online anonymity there are lots of tools available and Tor is one of the most frequently used. How does it work, how do you use it safely, and what are the risks? Is it possible to express your opinions anonymously on the internet today or can well funded actors circumvent the anonymity that Tor provides and find your true identity? What is the current status of the anonymity provided and what is being done to prevent current and future attacks on Tor?&lt;br /&gt;
&lt;br /&gt;
To answer those and other questions regarding Tor we have invited Georg Koppen and Philipp Winter from the Tor Project to join us on Thursday, March 19. Be sure to book your seat immediately.&lt;br /&gt;
&lt;br /&gt;
Who's this 'Tor', anyway?&lt;br /&gt;
Tor is an overlay network that enables people to use the Internet anonymously.  We give a brief overview of how Tor works and then focus on how Tor can be used safely. In particular, we talk about the problem of malicious exit relays, how they can be a problem for Tor users, and how the Tor Project deals with them.  Next, we talk about Tor Browser, The Tor Project's Firefox fork.  Tor Browser protects against a number of (deanonymization) attacks that are not prevented by Firefox or Chrome.  The goal of this talk is to show how Tor can be used safely for Web surfing and to correct common misunderstandings.&lt;br /&gt;
&lt;br /&gt;
'''Georg Koppen'''&lt;br /&gt;
Works for The Tor Project on the Tor Browser, Torbutton, and Tor's build automation. He's also the main developer behind Tor's effort to create deterministic builds.&lt;br /&gt;
&lt;br /&gt;
'''Phillipp Winter'''&lt;br /&gt;
Works for The Tor Project on research related to malicious exit relays and censorship circumvention. He is the main developer of ScrambleSuit, a polymorphic network traffic obfuscation protocol that's used by Tor.&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink.&lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsors TeliaSonera &amp;amp; Mullvad and a Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Surfing safely over the Tor network, part 1&lt;br /&gt;
&lt;br /&gt;
18:55 Short break&lt;br /&gt;
&lt;br /&gt;
19:00 Surfing safely over the Tor network, part 2&lt;br /&gt;
&lt;br /&gt;
19:40 Coming events &lt;br /&gt;
&lt;br /&gt;
19:50 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186737</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186737"/>
				<updated>2014-12-09T22:31:51Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]] - [https://www.youtube.com/watch?v=C7kjwqUTh3A video]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186733</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186733"/>
				<updated>2014-12-09T18:49:02Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Internetdagarna-Its.all.about.the.cookie.odp&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-12-04 Jonas Magazinius [[Media:Internetdagarna-Its.all.about.the.cookie.odp | Internetdagarna-Its.all.about.the.cookie]]&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Internetdagarna-Its.all.about.the.cookie.odp&amp;diff=186732</id>
		<title>File:Internetdagarna-Its.all.about.the.cookie.odp</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Internetdagarna-Its.all.about.the.cookie.odp&amp;diff=186732"/>
				<updated>2014-12-09T18:47:43Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186731</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186731"/>
				<updated>2014-12-09T18:42:39Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: added Media:Modems, ISPs &amp;amp; the media.pptx&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-12-04 Jonas Magazinius&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [[Media:Modems, ISPs &amp;amp; the media.pptx | Modems, ISPs &amp;amp; the media]] - [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Modems,_ISPs_%26_the_media.pptx&amp;diff=186730</id>
		<title>File:Modems, ISPs &amp; the media.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Modems,_ISPs_%26_the_media.pptx&amp;diff=186730"/>
				<updated>2014-12-09T18:39:53Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Modems, ISPs &amp;amp; the media&lt;br /&gt;
How the Comhem vulnerability could have been handled, and what happened instead&lt;br /&gt;
---&lt;br /&gt;
Who am I?&lt;br /&gt;
•@johanRmoller&lt;br /&gt;
• Penetration Tester @ Omegapoint&lt;br /&gt;
• Podcaster @ Säkerhetspodcasten&lt;br /&gt;
• Annoyer of ISPs&lt;br /&gt;
--&lt;br /&gt;
This talk is about&lt;br /&gt;
• How I hacked my own modem&lt;br /&gt;
• How Comhem handled my bug report&lt;br /&gt;
• How I worked with the media to force Comhem&lt;br /&gt;
into handling it better&lt;br /&gt;
• How they still failed&lt;br /&gt;
• And finally – How it should have been done&lt;br /&gt;
--&lt;br /&gt;
Lets go back a while&lt;br /&gt;
All the way back to August, 2013&lt;br /&gt;
--&lt;br /&gt;
I live in a ComHem house&lt;br /&gt;
Which means I get one of these:&lt;br /&gt;
--&lt;br /&gt;
Its my gateway to the internet&lt;br /&gt;
I decided to see if I could hack myself. There where two obvious&lt;br /&gt;
ways to go about it.&lt;br /&gt;
--&lt;br /&gt;
Pros &amp;amp; Cons&lt;br /&gt;
Firmware Analysis&lt;br /&gt;
Pros&lt;br /&gt;
• Can find stuff not obvious on the&lt;br /&gt;
web interface&lt;br /&gt;
• Could possibly reprogram the&lt;br /&gt;
modem&lt;br /&gt;
• Could find cooler vulnerabilities&lt;br /&gt;
Cons&lt;br /&gt;
• Could brick my modem&lt;br /&gt;
• Lots of work&lt;br /&gt;
• Not my area of expertise&lt;br /&gt;
--&lt;br /&gt;
Web Interface hacking&lt;br /&gt;
Pros&lt;br /&gt;
Easy and quick&lt;br /&gt;
Could find really stupid&lt;br /&gt;
vulnerabilities&lt;br /&gt;
Little to no risk of damaging the&lt;br /&gt;
modem&lt;br /&gt;
Cons&lt;br /&gt;
I wouldn’t be learning anything new&lt;br /&gt;
Soldering is cool!&lt;br /&gt;
Won’t find hidden stuff&lt;br /&gt;
--&lt;br /&gt;
The web interface&lt;br /&gt;
--&lt;br /&gt;
Fiddling around with burp&lt;br /&gt;
--&lt;br /&gt;
Finding CSRF Vuln&lt;br /&gt;
--&lt;br /&gt;
Impact of the CSRF vuln&lt;br /&gt;
Changing DNS&lt;br /&gt;
• Harvest account details&lt;br /&gt;
• Spread malware&lt;br /&gt;
• Steal Credit Card and bank details&lt;br /&gt;
Port Forwarding&lt;br /&gt;
• Expose internal network to internet&lt;br /&gt;
Turning on remote admin&lt;br /&gt;
• Changing all modem settings&lt;br /&gt;
• Stealing stored passwords (wifi passwords stored in cleartext)&lt;br /&gt;
• Downgrade security&lt;br /&gt;
DOS&lt;br /&gt;
• Brick the modem&lt;br /&gt;
--&lt;br /&gt;
Hardware hacking&lt;br /&gt;
--&lt;br /&gt;
Analyzing firmware&lt;br /&gt;
--&lt;br /&gt;
Sending the bug report&lt;br /&gt;
--&lt;br /&gt;
ComHem Responds&lt;br /&gt;
--&lt;br /&gt;
A year goes by&lt;br /&gt;
--&lt;br /&gt;
What is responsible disclosure?&lt;br /&gt;
--&lt;br /&gt;
Comhem Responds&lt;br /&gt;
--&lt;br /&gt;
Comhem responds again&lt;br /&gt;
• “The DNS problem only exists in Stockholm” -Comhem&lt;br /&gt;
--&lt;br /&gt;
Comhem locks down DNS&lt;br /&gt;
• Limiting their modems to only using Comhems DNS. This still&lt;br /&gt;
doesn’t solve the following problems:&lt;br /&gt;
Port Forwarding&lt;br /&gt;
• Expose internal network to internet&lt;br /&gt;
Turning on remote admin&lt;br /&gt;
• Changing all modem settings&lt;br /&gt;
• Stealing stored passwords (wifi passwords stored in cleartext)&lt;br /&gt;
• Downgrade security&lt;br /&gt;
DOS&lt;br /&gt;
• Brick the modem&lt;br /&gt;
Etc…&lt;br /&gt;
--&lt;br /&gt;
Minister proposes Law Change and PTS investigates&lt;br /&gt;
--&lt;br /&gt;
Comhem solves the problem&lt;br /&gt;
• On the 14th of November a firmware update finally arrives, solving the problem.&lt;br /&gt;
• At this point, the media attention has died down&lt;br /&gt;
• Noone cares that the issue is resolved&lt;br /&gt;
• The damage to Comhem is already done, and can’t be reversed at this point&lt;br /&gt;
--&lt;br /&gt;
What did we learn&lt;br /&gt;
• How should they have done it?&lt;br /&gt;
• Can we help our clients and companies handle these issues?&lt;br /&gt;
•What is it like to deal with the media&lt;br /&gt;
• Knowing what you want to say and being able to back it up&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186729</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186729"/>
				<updated>2014-12-09T18:35:12Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: added Category:OWASP_Video&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-12-04 Jonas Magazinius&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]] [[Category:OWASP_Video]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186728</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=186728"/>
				<updated>2014-12-09T18:32:07Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: /* Historiska Presentationer: PDF, video med mera */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-12-04 Jonas Magazinius&lt;br /&gt;
* 2014-12-04 Johan Rydberg Möller [https://www.youtube.com/watch?v=vrJ_U8HFJEc video]&lt;br /&gt;
* 2014-04-24 Dagfinn Övstrud [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
* 2014-04-24 Jan Wellergård [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]]&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schionning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2014 ==&lt;br /&gt;
&lt;br /&gt;
'''2014-11-13 -  Hacking unleashed'''&lt;br /&gt;
&lt;br /&gt;
There seems to be loads of networking equipment out there being in a quite sad state from a security perspective. Yet people rely on them for everyday business and home networking. We're talking, of course, about routers and dongles. OWASP Göteborg will therefore dedicate this event to inform about the insecurity of such devices. We have invited security experts Adde Lindh and Johan Rydberg Möller to guide you through the evening.&lt;br /&gt;
&lt;br /&gt;
2014-12-04 is the evening you all have been waiting for the entire autumn. Welcome to an evening that you'll never forget.&lt;br /&gt;
&lt;br /&gt;
The event is sponsored by Omegapoint, so we wish to thank them in advance for food, drinks and the venue!&lt;br /&gt;
The event will be held in English except where noted&lt;br /&gt;
&lt;br /&gt;
Link to [https://www.eventbrite.com/e/hacking-unleashed-tickets-14191957527 eventbrite]&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
17:30 Event starts with a light snack and drink. &lt;br /&gt;
&lt;br /&gt;
18:00 A word from our sponsor Omegapoint. Community update&lt;br /&gt;
&lt;br /&gt;
18:15 Johan Rydberg Möller - Modems, ISPs and the Media - How the Comhem vulnerability could have been handled, and what happened instead [Talk held in Swedish. Slides in English]&lt;br /&gt;
&lt;br /&gt;
19:00 Short break&lt;br /&gt;
&lt;br /&gt;
19:05 Adde Lindh / ISecure Sweden AB - Attacking mobile broadband modules like a criminal would [BlackHat talk] '''CANCELLED'''&lt;br /&gt;
&lt;br /&gt;
19:50 Coming events &lt;br /&gt;
&lt;br /&gt;
20:00 Beer, snacks and some serious security live chat&lt;br /&gt;
&lt;br /&gt;
Approx. 21:00 Event ends&lt;br /&gt;
&lt;br /&gt;
Speaker bios and abstracts&lt;br /&gt;
&lt;br /&gt;
'''Johan Rydberg Möller'''&lt;br /&gt;
 &lt;br /&gt;
On the 31st of October this year Dagens Nyheter published an article which prompted Post- och Telestyrelsen to begin an investigation of the internet provider Comhem with suspicions of breaches against the electronic communications law. What prompted DN to publish the article was the disclosure of a serious vulnerability in the Netgear modems that Comhem supply their customers whith, a vulnerability that had gone unpatched for over fourteen months since Comhem was first made aware of the issue. I was the one who first brought Comhems attention to the vulnerability and I worked with DNs reporter in an effort to shed light on the problem, after my correspondence with Comhem did not yield any results. In this talk I will discuss and demonstrate the vulnerability, talk briefly about responsible disclure and share my experience working with the media in order to&lt;br /&gt;
force change through public opinion, when nothing else works.&lt;br /&gt;
&lt;br /&gt;
Johan Rydberg Möller is a security specialist at Omegapoint, focused mainly on web security and penetration testing. He is a founder of the security podcast Säkerhetspodcasten and occassionally appears in the news discussing security issues&lt;br /&gt;
&lt;br /&gt;
'''Adde Lindh'''&lt;br /&gt;
&lt;br /&gt;
While there has certainly been some interesting research into the security of mobile broadband modems, or &amp;quot;dongles,&amp;quot; in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and effort required to execute such an attack reduces the potential number of attackers, but there are easier ways to monetize from attacking these devices too.&lt;br /&gt;
&lt;br /&gt;
This talk will focus on some more likely scenarios; web-based attacks that are not that hard to pull off but that will allow the attacker to cash in without too much effort. The speaker will demonstrate how to profit, steal sensitive information, and establish a persistent hold on the devices, and also how a seemingly modest attack could be used as part of a more advanced attack chain. There will also be an analysis of why it is easy being an Internet criminal, and how it will continue to be so unless drastic changes are made to how we approach and implement new consumer technology.&lt;br /&gt;
&lt;br /&gt;
Oh, and there will be demos.&lt;br /&gt;
&lt;br /&gt;
Andreas Lindh is a security analyst and engineer working for ISecure Sweden. In his day job, he does a wide variety of defensive security work such as threat analysis, incident detection and response, and database security for a number of large clients in the private and public sector. In his spare time, he does web application and browser security research, mainly focused on consumer security. He also likes long walks on the Internet and romantic evenings in front of a Python IDE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-05-20 - Jans och Dagfinns slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Jans slides: [[Media:Privacy_by_Design_v5.pptx‎|Privacy by Design]] &lt;br /&gt;
&lt;br /&gt;
Dagfinns slides: [[Media:OWASP_Dagfinn_final.pdf|Privacy by Design @ Västtrafik]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2014-04-03 -  Privacy by design'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg gör en djupdykning i området privacy den 24e april. Internet och sociala nätverk har bidragit till en ökat intresse för privacy. Företag som måste eller vill skydda sina användares data måste fatta privacybeslut redan under designfasen av utvecklingsarbetet. Vi tittar på vad Pricacy by Design innebär och tittar också på ett konkret exempel på hur PoD-ideerna kan tillämpas. För att guida oss genom kvällen har vi bjudit in Jan Wellergård från TeliaSonera och Dagfinn Övstrud från Kentor. Sponsor är TeliaSonera och GIVETVIS kommer det bli helt awesome!&lt;br /&gt;
&lt;br /&gt;
Länk till [https://www.eventbrite.com/e/privacy-by-design-tickets-11189308523 eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Agenda&lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka&lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.teliasonera.com/sv/ TeliaSonera] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:15 [Jan Wellergård/TeliaSonera] - Privacy by design&lt;br /&gt;
&lt;br /&gt;
19:00 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:05 [Dagfinn Övstrud/Kentor] Privacy by design hos Västtrafik&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Jan Wellergård'''&lt;br /&gt;
&lt;br /&gt;
What is privacy by design and is it really a new requirement? Privacy matters and protecting personal data is a legal obligation since late 90s. However, one needs a structured way to achieve compliance. It needs to be addressed already in Design.&lt;br /&gt;
&lt;br /&gt;
Jan Wellergård is the Personal Data Representative (sv. Personuppgiftsombud) for TeliaSonera’s Swedish entities. He is monitoring TeliaSonera’s compliance and supporting the business in privacy matters. Jan is also the Security Director for Group Technology – IT Support systems working with information security management&lt;br /&gt;
&lt;br /&gt;
'''Dagfinn Övstrud'''&lt;br /&gt;
&lt;br /&gt;
This talk will introduce and discuss selected relevant systems from the vast systems flora at Västtrafik, on how they deal with handling and protecting privacy data. It will also cover some general infrastructure design principles, and challenges faced in general and as a company in the public sector.&lt;br /&gt;
&lt;br /&gt;
Dagfinn is an infrastructure architect with a special interest in the areas of security, availability and performance. Mostly Microsoft-related, but nobody's perfect. He worked in Västtrafik's IT department from 2008 to 2014, when he joined Kentor AB as a consultant. He has a life too, and in addition to regular mainstream hobbies and interests he has recently picked up his guitar and is in the process of writing and recording his very own independent solo album in the genre of melodic death metal \m/ !&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=170201</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=170201"/>
				<updated>2014-03-15T23:59:15Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube-kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i [http://lists.owasp.org/mailman/listinfo/owasp-sweden OWASP Sweden-mailinglistan]). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schoning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 OWASP Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 OWASP Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 OWASP - Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
''' 2014-02-19 - Klas och Pers slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
''' 2014-01-29 - Autentisering, hur svårt kan det va?&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2013 ==&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
''' 2013-11-03 - SSL för alla&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
'''2013-09-12 - Så där ja, nu kör vi igång år tre&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2012 ==&lt;br /&gt;
&lt;br /&gt;
'''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
'''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
'''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-25 - Jim Manico's slides tillgängliga&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
'''2012-02-27 - Snabbt påkommen säkpub&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-25 - Missa inte dev:mobile&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-02-06 - Öppningsceremoni för Software Center&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Communityhack&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2012-01-17 - Så där ja!&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
'''2012-01-16 - Vårens aktiviteter&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborg 2011 ==&lt;br /&gt;
&lt;br /&gt;
'''2011-11-04 - Ett par små uppdateringar&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-10-18 - Meeting outline for November 3rd&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
'''2011-10-14 - OWASP Göteborg den 3e november - uppdatering&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - OWASP Göteborg den 3e november&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
'''2011-09-17 - Ännu ett wow!&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
'''Nästa träff + wow!&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
'''Presentationsmaterial&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg web site goes Swedish + surprise!&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
'''OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''July 4th, 2011 - OWASP-Gothenburg opens!&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168925</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168925"/>
				<updated>2014-02-24T22:03:41Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Promo för owaspgbg kanalen&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Va? Inte medlem? [http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i mailinglistan.]&lt;br /&gt;
&lt;br /&gt;
Vi lägger upp presentationer på youtube kanalen [http://www.youtube.com/user/owaspgbg owaspgbg].&lt;br /&gt;
&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i OWASP Sweden-mailinglistan). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schoning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 OWASP Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 OWASP Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 OWASP - Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
===2014-02-19 - Klas och Pers slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
===2014-01-29 - Autentisering, hur svårt kan det va?===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
===2013-11-03 - SSL för alla===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
===2013-09-12 - Så där ja, nu kör vi igång år tre===&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich===&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
===2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november===&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
===2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012===&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
===2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security===&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-03-25 - Jim Manico's slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
===2012-03-03 - Nästa officiella event spikat till torsdag den 26e april===&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige===&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
===2012-02-27 - Snabbt påkommen säkpub===&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-02-25 - Missa inte dev:mobile===&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-02-06 - Öppningsceremoni för Software Center===&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
===2012-01-17 - Communityhack===&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-01-17 - Så där ja!===&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
===2012-01-16 - Vårens aktiviteter===&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
===2011-11-04 - Ett par små uppdateringar===&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2011-10-18 - Meeting outline for November 3rd===&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
===2011-10-14 - OWASP Göteborg den 3e november - uppdatering===&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2011-09-17 - OWASP Göteborg den 3e november===&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
===2011-09-17 - Ännu ett wow!===&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
===Nästa träff + wow!===&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
===Presentationsmaterial===&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
===OWASP Gothenburg web site goes Swedish + surprise!===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
===OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective===&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===July 4th, 2011 - OWASP-Gothenburg opens!===&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168924</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168924"/>
				<updated>2014-02-24T21:52:51Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Listan komplett nu kanske?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Va? Inte medlem? [http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i mailinglistan.]&lt;br /&gt;
&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i OWASP Sweden-mailinglistan). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schoning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 OWASP Fredrik Sjöström [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]] [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 OWASP Robin Blokker [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]] [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 OWASP - Michael Boman [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]] [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1 - GoodFet]] [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
* 2012-07-04 Ulf Larson [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
* 2012-04-26 Erlend Oftedal [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
* 2012-04-26 Combitech [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
* 2011-11-03 Martin Holst Swende [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
* 2011-11-03 Stefano Di Paola [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
* 2011-08-25 Per Josefsson [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]]&lt;br /&gt;
* 2011-08-25 Jonas Magazinius [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
===2014-02-19 - Klas och Pers slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
===2014-01-29 - Autentisering, hur svårt kan det va?===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
===2013-11-03 - SSL för alla===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
===2013-09-12 - Så där ja, nu kör vi igång år tre===&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich===&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
===2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november===&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
===2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012===&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
===2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security===&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-03-25 - Jim Manico's slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
===2012-03-03 - Nästa officiella event spikat till torsdag den 26e april===&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige===&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
===2012-02-27 - Snabbt påkommen säkpub===&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-02-25 - Missa inte dev:mobile===&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-02-06 - Öppningsceremoni för Software Center===&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
===2012-01-17 - Communityhack===&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-01-17 - Så där ja!===&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
===2012-01-16 - Vårens aktiviteter===&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
===2011-11-04 - Ett par små uppdateringar===&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2011-10-18 - Meeting outline for November 3rd===&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
===2011-10-14 - OWASP Göteborg den 3e november - uppdatering===&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2011-09-17 - OWASP Göteborg den 3e november===&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
===2011-09-17 - Ännu ett wow!===&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
===Nästa träff + wow!===&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
===Presentationsmaterial===&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
===OWASP Gothenburg web site goes Swedish + surprise!===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
===OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective===&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===July 4th, 2011 - OWASP-Gothenburg opens!===&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168923</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168923"/>
				<updated>2014-02-24T21:44:19Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Wiithout structure there is no hope&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Va? Inte medlem? [http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i mailinglistan.]&lt;br /&gt;
&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i OWASP Sweden-mailinglistan). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer: PDF, video med mera ==&lt;br /&gt;
&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schoning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 OWASP Fredrik Sjöström Malware [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 OWASP Robin Blokker Penetration Testing [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 OWASP - Michael Boman Malware Analysis as a Hobby [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors OWASP Hardware Hacking - GoodFet [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario&lt;br /&gt;
* 2012-07-04 Ulf Larson&lt;br /&gt;
* 2012-04-26 Erlend Oftedal&lt;br /&gt;
* 2012-04-26 Combitech&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico &lt;br /&gt;
* 2011-11-03 Martin Holst Swende&lt;br /&gt;
* 2011-11-03 Stefano Di Paola&lt;br /&gt;
* 2011-08-25 Pers &lt;br /&gt;
* 2011-08-25 Jonas &lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
===2014-02-19 - Klas och Pers slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
===2014-01-29 - Autentisering, hur svårt kan det va?===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
===2013-11-03 - SSL för alla===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
===2013-09-12 - Så där ja, nu kör vi igång år tre===&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich===&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
===2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november===&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
===2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012===&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
===2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security===&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-03-25 - Jim Manico's slides tillgängliga===&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
===2012-03-03 - Nästa officiella event spikat till torsdag den 26e april===&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige===&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
===2012-02-27 - Snabbt påkommen säkpub===&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-02-25 - Missa inte dev:mobile===&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-02-06 - Öppningsceremoni för Software Center===&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
===2012-01-17 - Communityhack===&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2012-01-17 - Så där ja!===&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
===2012-01-16 - Vårens aktiviteter===&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
===2011-11-04 - Ett par små uppdateringar===&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2011-10-18 - Meeting outline for November 3rd===&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
===2011-10-14 - OWASP Göteborg den 3e november - uppdatering===&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===2011-09-17 - OWASP Göteborg den 3e november===&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
===2011-09-17 - Ännu ett wow!===&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
===Nästa träff + wow!===&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
===Presentationsmaterial===&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
===OWASP Gothenburg web site goes Swedish + surprise!===&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
===OWASP Gothenburg Meeting, August 25 2011, Welcome to Owasp Gothenburg + Owasp top ten w/ demo + Webappsec from a programming language perspective===&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===July 4th, 2011 - OWASP-Gothenburg opens!===&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168919</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168919"/>
				<updated>2014-02-24T21:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: mer på gamla historiska presentationer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs lokalavdelning  ==&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Va? Inte medlem? [http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i mailinglistan.]&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer  ==&lt;br /&gt;
&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-04-29 Mario Heiderich [http://www.slideshare.net/x00mario/the-innerhtml-apocalypse The innerHTML Apocalypse]&lt;br /&gt;
* 2013-04-29 Mario Heiderich XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
* 2013-01-31 Mattias Wecksten [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
* 2013-01-31 Rickard Bodfors [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
* 2013-01-31 Mårten Schoning [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
* 2012-11-22 OWASP Fredrik Sjöström Malware [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* 2012-11-22 OWASP Robin Blokker Penetration Testing [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* 2012-11-22 OWASP - Michael Boman Malware Analysis as a Hobby [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
* 2012-10-08 Mathias Jidhage och Rikard Bordfors OWASP Hardware Hacking - GoodFet [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* 2012-07-04 Mikko Saario&lt;br /&gt;
* 2012-07-04 Ulf Larson&lt;br /&gt;
* 2012-04-26 Erlend Oftedal&lt;br /&gt;
* 2012-04-26 Combitech&lt;br /&gt;
* 2012-03-03 Jim @Manicode Manico &lt;br /&gt;
* 2011-11-03 Martin Holst Swende&lt;br /&gt;
* 2011-11-03 Stefano Di Paola&lt;br /&gt;
* 2011-08-25 Pers &lt;br /&gt;
* 2011-08-25 Jonas &lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
 '''2014-02-19 - Klas och Pers slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
 '''2014-01-29 - Autentisering, hur svårt kan det va?'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
 '''2013-11-03 - SSL för alla'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
 '''2013-09-12 - Så där ja, nu kör vi igång år tre'''&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich'''&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
 '''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november'''&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
 '''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012'''&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
 '''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security'''&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-03-25 - Jim Manico's slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
 '''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april'''&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige'''&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''2012-02-27 - Snabbt påkommen säkpub'''&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-02-25 - Missa inte dev:mobile'''&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-02-06 - Öppningsceremoni för Software Center'''&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
 '''2012-01-17 - Communityhack'''&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-01-17 - Så där ja!'''&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
 '''2012-01-16 - Vårens aktiviteter'''&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
 '''2011-11-04 - Ett par små uppdateringar'''&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2011-10-18 - Meeting outline for November 3rd'''&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
 '''2011-10-14 - OWASP Göteborg den 3e november - uppdatering'''&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2011-09-17 - OWASP Göteborg den 3e november'''&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
 '''2011-09-17 - Ännu ett wow!'''&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
 '''Nästa träff + wow!'''&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
 '''Presentationsmaterial'''&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
 '''OWASP Gothenburg web site goes Swedish + surprise!'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
 '''OWASP Gothenburg Meeting, August 25 2011''', '''Welcome to Owasp Gothenburg''' + '''Owasp top ten w/ demo''' + '''Webappsec from a programming language perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 4th, 2011 - OWASP-Gothenburg opens!'''&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i OWASP Sweden-mailinglistan). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen  ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168918</id>
		<title>Gothenburg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Gothenburg&amp;diff=168918"/>
				<updated>2014-02-24T21:04:09Z</updated>
		
		<summary type="html">&lt;p&gt;Peter Magnusson: Påbörjat historiska event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--&lt;br /&gt;
Use if chapter template is used&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Gothenburg|extra=Välkommen till OWASP Göteborgs hemsida! Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sweden|emailarchives=http://lists.owasp.org/pipermail/owasp-sweden}}&lt;br /&gt;
--&amp;gt; &amp;lt;!--&lt;br /&gt;
Remove all text below until the next comment is encountered if chapter template is used&lt;br /&gt;
--&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;owaspbanner /&amp;gt;&amp;lt;/div&amp;gt; &amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;'''[http://www.owasp.org/index.php/Advertising Ad Space Available for 2011]'''&amp;lt;/div&amp;gt; &lt;br /&gt;
----&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
[[File:Owaspgbg_brand_logo_web.png|options|500px]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs lokalavdelning  ==&lt;br /&gt;
&lt;br /&gt;
Välkommen till OWASP Göteborgs hemsida. Göteborgskapitlets ledare är [mailto:ulf.larson@owasp.org Ulf Larson], [mailto:mattias.jidhage@owasp.org Mattias Jidhage] och Jonas Magazinius. &lt;br /&gt;
&lt;br /&gt;
Va? Inte medlem? [http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i mailinglistan.]&lt;br /&gt;
&lt;br /&gt;
== Historiska Presentationer  ==&lt;br /&gt;
&lt;br /&gt;
* 2014-02-18 Klas Lindfors [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] - [http://www.youtube.com/watch?v=ORXDPNyXM-4 video]&lt;br /&gt;
* 2014-02-18 Per Thorsheim [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]] - [http://www.youtube.com/watch?v=dc-bF2CU0Xo video]&lt;br /&gt;
* 2013-11-30 Joachim Strömbergsson och Peter Magnusson [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]] - [http://www.youtube.com/watch?v=UR5S-OtHUYg video1] [http://www.youtube.com/watch?v=7GJ0Z6EjDVQ video2]&lt;br /&gt;
* 2013-10-24 Ulf Larson [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
* 2013-10-24 Jonas Magazinus [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
* 2013-01-31&lt;br /&gt;
* 2013-01-31&lt;br /&gt;
* 2013-01-31&lt;br /&gt;
* OWASP Hardware Hacking - GoodFet [http://www.youtube.com/watch?v=sPx0JWOIcus video]&lt;br /&gt;
* OWASP Fredrik Sjöström Malware [http://www.youtube.com/watch?v=dgwpjQXguso video]&lt;br /&gt;
* OWASP Robin Blokker Penetration Testing [http://www.youtube.com/watch?v=lilDGi3AgzE video]&lt;br /&gt;
* OWASP - Michael Boman Malware Analysis as a Hobby [http://www.youtube.com/watch?v=Dth_mJEsGTo video]&lt;br /&gt;
&lt;br /&gt;
== Lokala nyheter  ==&lt;br /&gt;
&lt;br /&gt;
 '''2014-02-19 - Klas och Pers slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Klas slides: [[Media:Klas_otp_OWASPgbg20140219.pdf‎|One time passwords]] &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:(Almost)_everything_about_passwords_that_OWASP_OWASPGbg_20140218_Per_Thorsheim.pdf‎|(Almost) everything about passwords that OWASP won't teach you]]&lt;br /&gt;
&lt;br /&gt;
 '''2014-01-29 - Autentisering, hur svårt kan det va?'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg kör tema autentisering den 18e februari och har bjudit in Per Thorsheim, grundare av Passwords-konferensen, och Klas Lindfors från Yubico. Magnus Almgren från Data- och Informationsteknik vid Chalmers kommer tala kort om RAID2014, som i höst kommer hållas i Göteborg i Chalmers regi. Med andra ord, en mycket spännande agenda, som vanligt! Kvällens sponsor är Ajilon Consultants AB.&lt;br /&gt;
&lt;br /&gt;
Länk till [https://owaspgbg-authentication.eventbrite.com eventbrite]&lt;br /&gt;
&lt;br /&gt;
''Eventet kommer hållas på engelska''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.ajilonconsultants.se/ Ajilon Consultants] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 [Klas Lindfors/Yubico] - OTP and U2F&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 [Per Thorsheim/Stricture Consulting Group, God Praksis AS] - (Almost) everything about passwords that OWASP won't teach you&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Klas Lindfors'''&lt;br /&gt;
&lt;br /&gt;
One time passwords are being deployed by larger websites including Google, Facebook, GitHub, LinkedIn etc but they have their ups and downs.  What type of OTP should you use; the YubiKey OTP, OATH HOTP, or OATH TOTP?  How would you validate the OTP; building your own server and protecting the secrets, or rely on a cloud service like Yubico's YubiCloud or VeriSign VIP?  The talk will also cover the future of two-factor authentication with the FIDO Universal 2nd Factor (U2F) protocol.&lt;br /&gt;
&lt;br /&gt;
Klas Lindfors is a software developer at Yubico, working with one time passwords at all layers: firmware, personalization &amp;amp; validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Per Thorsheim'''&lt;br /&gt;
&lt;br /&gt;
OWASP has some wonderful guidelines on sending, storing and resetting passwords. However there are still challenges that cannot be addressed&lt;br /&gt;
through technical measures, they need to be addressed by humans, and not just developers. Through color &amp;amp; font selections, association elements, password managers, human pattern analysis and more, this talk will discuss what we are still doing wrong, the risks associated with bad passwords, and give some advice on what we need to do in order to improve our online security.&lt;br /&gt;
&lt;br /&gt;
Per Thorsheim is the founder &amp;amp; main organizer of the Passwords conferences (PasswordsCon.org), a conference fully dedicated to passwords &amp;amp; PINs. He's been working, examining, playing, dreaming and discusssing passwords for more than 14 years, and is still going strong. He publicly disclosed the hacking of Linkedin in june 2012, and has been interviewed and quoted around the world on his excessive interest in passwords. During daytime he tries to solve challenges for his customers through security awareness training &amp;amp; security advisory services. Some say he's good at explaining advanced topics to regular humans. He is certified CISA, CISM and CISSP-ISSAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-11-30 - Peters och Joachims SSL für alle slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Slides tillgängliga här: [[Media:OWASP_SSL_20131128_preso.pdf|SSL für alle]]&lt;br /&gt;
&lt;br /&gt;
 '''2013-11-03 - SSL för alla'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg presenterar stolt en helkväll om SSL/TLS och HTTPS den 28e november. Vi kommer denna gång vara i Omegapoints lokaler på Rosenlundsgatan 3 och vi startar som vanligt med mackor och mingel 17:30.&lt;br /&gt;
&lt;br /&gt;
Vi har denna gång två mycket intressanta och erfarna talare, Joachim Strömbergson och Peter Magnusson. Båda med lång erfarenhet av kryptoteknik och kryptoimplementationer. Vi tar fram stora spaden och gräver fram detaljerna om SSL/TLS och HTTPS. De allra flesta kommer i daglig kontakt med begreppen genom webbrowsern och vi har säkert alla hört talas om någon av de lyckade attacker som utförts under senaste år. Dags att gå till botten med det här! Vad är SSL/TLS och HTTPS egentligen, varför har vi problem, och kan vi lita på det framöver. I så fall, varför? &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-ssl-2013.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. &lt;br /&gt;
&lt;br /&gt;
18:00 Community update + vår sponsor [http://www.omegapoint.se/ Omegapoint] säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:10 Joachim Strömbergson&lt;br /&gt;
&lt;br /&gt;
19:00 Paus&lt;br /&gt;
&lt;br /&gt;
19:10 Peter Magnusson&lt;br /&gt;
&lt;br /&gt;
19:50 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
What is SSL/TLS and HTTPS? What security is it intended to provide? In recent years the SSL/TLS and HTTPS technology has been had numerous alerts on real world, practical crypto attacks, effectively&lt;br /&gt;
unravelling HTTPS security promises. What are these attacks, why do they work, and how were the attacks combatted in SSL implementations?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Joachim Strömbergson'''&lt;br /&gt;
&lt;br /&gt;
Joachim Strömbergson is a security expert at Secworks, a consultancy&lt;br /&gt;
founded by Joachim. By working as an advisor and educator, providing&lt;br /&gt;
analysis and implementations Joachim assists his customers in finding&lt;br /&gt;
the right security for their products and services. SSL and TLS in&lt;br /&gt;
embedded systems, Internet of Things and SCADA system security are&lt;br /&gt;
things Joachims battles during day time. On his spare time Joachim&lt;br /&gt;
implements ciphers and blogs about security at secworks.se&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Peter Magnusson'''&lt;br /&gt;
&lt;br /&gt;
Peter is a speaker in the Säkerhetspodcasten security podcast&lt;br /&gt;
(sakerhetspodcasten.se) and has a great interest in applied cryptography&lt;br /&gt;
and practical cryptographic attacks. Peter works as security consultant at&lt;br /&gt;
Omegapoint and specialize in application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-10-24 - Ulfs och Jonas slides från senaste träffen tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Ulfs slides tillgängliga här: [[Media:OWASP_Topp_tio_Ulf_Larson_20131010.pdf‎|OWASP topp tio 2013 with WebGoat and ZAP]]&lt;br /&gt;
&lt;br /&gt;
Jonas slides tillgängliga här: [[Media:Crossing.Origins.by.Crossing.Formats-Jonas.Magazinius-OWASP-131010.pptx|Crossing origins by crossing formats]]&lt;br /&gt;
&lt;br /&gt;
 '''2013-09-12 - Så där ja, nu kör vi igång år tre'''&lt;br /&gt;
&lt;br /&gt;
Hej Alla!&lt;br /&gt;
&lt;br /&gt;
Nu kör vi igång år tre! Den tionde oktober startar vi upp med 2013-års variant av vårt första event i augusti 2011. Topp tio 2013 har funnits ute ett par månader nu och vi tänkte naturligtvis täcka upp detta. Vi kommer blanda och ge från akademisk forskning i absoluta framkant, senaste &amp;quot;topp tio&amp;quot;-listan, illustrerad med väl valda demonstrationer, samt en introduktion till OWASP och OWASP Göteborg. Vi vill särskilt välkomna de som inte varit hos oss förut, så om någon av Er erfarna säkerhetsrävar känner nån som är intresserad men inte deltagit tidigare får ni gärna tipsa dem. En grym kväll är ju faktiskt bara en registrering på en maillista bort.&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-top10-2013-eorg.eventbrite.com/ eventbrite]&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor ([http://www.starrepublic.com/ Star Republic]) säger ett par väl valda ord. Tack för sponset!&lt;br /&gt;
&lt;br /&gt;
18:00 OWASP Göteborg - Community update + Det här är OWASP Göteborg&lt;br /&gt;
&lt;br /&gt;
18:10 Ulf och Erik - OWASP topp tio 2013 + Demo&lt;br /&gt;
&lt;br /&gt;
19:10 Paus&lt;br /&gt;
&lt;br /&gt;
19:20 Jonas - Polyglot&lt;br /&gt;
&lt;br /&gt;
20:00 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
'''Ulf och Erik'''&lt;br /&gt;
&lt;br /&gt;
We present the OWASP top ten list for 2013. The top ten list contains the most serious application security risks. In the top of the list we find SQL injection. Well known, but still going strong, due to the potentially disastrous consequences a successful attack may have. In the upper half of the list, we also find broken authentication and, of course, Cross-Site Scripting. Among the newcomers to the list, we find sensitive data exposure, and the use of components with known vulnerabilities. In addition to presenting the list, we also demonstrate some simple attacks.&lt;br /&gt;
&lt;br /&gt;
'''Jonas'''&lt;br /&gt;
&lt;br /&gt;
In a heterogeneous system like the web, information is exchanged between components in versatile formats. A new breed of attacks is on the rise that exploit the mismatch between the expected and provided content. This paper focuses on the root cause of a large class of attacks: polyglots. A polyglot is a program that is valid in multiple programming languages. Polyglots allow multiple interpretation of the content, providing a new space of attack vectors. We characterize what constitutes a dangerous format in the web setting and identify particularly dangerous formats, with PDF as the prime example. We demonstrate that polyglot-based attacks on the web open up for insecure communication across Internet origins. The paper presents novel attack vectors that infiltrate the trusted origin by syntax injection across multiple languages and by content smuggling of malicious payload that appears formatted as benign content. The attacks lead to both cross-domain leakage and cross-site request forgery. We perform a systematic study of PDF-based injection and content smuggling attacks. We evaluate the current practice in client/server content filtering and PDF readers for polyglot-based attacks, and report on vulnerabilities in the top 100 Alexa web sites. We identify five web sites to be vulnerable to syntax injection attacks. Further, we have found two major enterprise cloud storage services to be susceptible to content smuggling attacks. Our recommendations for protective measures on server side, in browsers, and in content interpreters (in particular, PDF readers) show how to mitigate the attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-04-29 - OWASP Göteborg - An evening with Mario Heiderich'''&lt;br /&gt;
&lt;br /&gt;
Vi är stolta att presentera en helkväll med Mario Heiderich. Mario kommer hålla två föredrag om Cross Site Scripting: ett om mXSS och ett om hur XSS utvecklats genom historien. Kommer garanterat bli mycket, mycket intressant!&lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-mario-xss-eorg.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Chalmers för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska/The event will be held in its entirety in English'''&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda &lt;br /&gt;
&lt;br /&gt;
17:30 Kvällen inleds med macka och dricka. Vår sponsor Chalmers säger ett par väl valda ord&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Mario Heiderich - The InnerHTML Apocalypse&lt;br /&gt;
&lt;br /&gt;
18.45 Paus&lt;br /&gt;
&lt;br /&gt;
19:00 Mario Heiderich - XSS from 1999 to 2013&lt;br /&gt;
&lt;br /&gt;
19:45 Öl, snacks och livechat om säkerhet&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet slutar&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio:&lt;br /&gt;
&lt;br /&gt;
Mario Heiderich is founder of the German/UK pen-test outfit Cure53 and a Microsoft security contractor. He focuses on HTML5, SVG security, script-less attacks and believes XSS can be eradicated by using JavaScript. Maybe. Some day. Actually quite soon. Mario invoked the HTML5 security cheat-sheet, the Alexa Top 1x search engine Crawly and several other projects. In the remaining time he delivers trainings and security consultancy for larger German and international companies for sweet sweet money and the simple minded fun in breaking things. Mario has spoken on a large variety of international conferences - both academic and industry-focused, co-authored two books, several academic papers and doesn't see a problem in his one year old son having a tablet already. There you have it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The InnerHTML Apocalypse - How mXSS Attacks change everything we believed we knew so far&lt;br /&gt;
 &lt;br /&gt;
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and applications that are affected by this kind of attack. Several live demos during the presentation will share these impressions and help understanding, what mXSS is, why mXSS is possible and why it is of importance for defenders as well as professional attackers to understand and examine mXSS even further. The talk wraps up several years of research on this field, shows the abhorrent findings, discusses the consequences and delivers a step-by-step guide on how to protect against this kind of mayhem - with a strong focus on feasibility and scalability.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
XSS from 1999 to 2013: The &amp;quot;Doctrine Classique&amp;quot; of Websecurity&lt;br /&gt;
 &lt;br /&gt;
XSS attacks were first documented about 15 years ago. Since then, the attack technique has undergone an evolution, that resembles the classic dramatic theory - including catastasis, heroism, villainy and peripeteia.&lt;br /&gt;
 &lt;br /&gt;
Now, HTML and JavaScript enter the world of operating systems and the XSS tragedy is on the verge of becoming a nightmare beyond human control. The once harmless &amp;quot;alert&amp;quot; is now a black swan of code execution, the phantom of the browser, Gretchen and Mephistopheles at the same time.&lt;br /&gt;
 &lt;br /&gt;
This talk attempts to go back into the early past and unveil the causes for XSS, point fingers at the true evil that made the Internet what it is today, outline our mistakes and the general failure of the fat-bellied websecurity community and try to leave the hope, that not all will be lost in the realms of the WWW.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-04-29 - Slides från OWASP Göteborg 2013-02-28 finns nu tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt Februarievent tillgängliga här&lt;br /&gt;
&lt;br /&gt;
Mattias slides: [[Media:Mattias_wecksten_OWASPGBG_20130228.pdf|IT-forensics and information security]]&lt;br /&gt;
&lt;br /&gt;
Rikards slides: [[Media:Rikard_bodforss_OWASPGBG_20130228.pdf|Don't touch that system]]&lt;br /&gt;
&lt;br /&gt;
Mortens slides: [[Media:Morten_schionning_OWASPGPG_20130228.odp|Incidents and forensics]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2013-01-31 - OWASP Göteborg - IT-forensik, 28e februari'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg drar igång våren med en spännande presentationskväll om IT-forensik i samarbete med ISACA. Vi har tre talare på schemat och vi lovar att det kommer bli en blandning ni inte kan motstå! &lt;br /&gt;
&lt;br /&gt;
Länk till [http://owaspgbg-it-forensics.eventbrite.com/ eventbrite] &lt;br /&gt;
&lt;br /&gt;
Vi tackar varmt vår sponsor Omegapoint för käk och för att vi får använda lokalen!&lt;br /&gt;
&lt;br /&gt;
'''Eventet kommer hållas på engelska'''&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Omegapoint&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Morten Schiønning/TeliaSonera] - Incidents and Forensics&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Rikard Bodforss/Omegapoint] - Don't touch that system!&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Mattias Weckstén/Halmstad University] - Entry level it-forensic training from an academic point of view&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
'''Morten Schiønning'''&lt;br /&gt;
&lt;br /&gt;
As with most things in life, dealing with security incidents is something you need to prepare and train for. Once a security incident has been declared you will need to do a number of things simultaneously, an essential part of which is the gathering of evidence to the facts. There are lots of considerations to be made and usually a lot of people to lead and/or coordinate. Understanding the risks and the pit-falls, working disciplined,  knowing the dos and don’ts and keeping a cool head may very well save the day. Even of you as an incident handler do not do the actual forensics, you need to know what happens, when and how, in order to make the best of the possibilities you have - as you are always at a disadvantage of the perpetrator.&lt;br /&gt;
 &lt;br /&gt;
I am a Senior Security Investigator at TeliaSonera CERT Coordination Centre, I have my offices in Copenhagen, but TS-CERT serve the entire TeliaSonera Group and fully owned companies in 17 countries. I have more than 25 years of experience in working with IT and 12 of those have been spent as a security professional. I have been half of that at DK*CERT, UNI-C, the CERT for the Danish education- and research network as well as the general public and the rest in various functions at TeliaSonera. I have also worked independently, doing forensics, for the Danish Police, several news media and as a specialist for the Danish Judicial system. I am a GIAC certified Forensics analyst and Incident Handler and do most of the ‘hands-on’ disciplines within IT and Mobile Forensics as well as penetration testing, security auditing and most, if not all other aspects of IT security and physical security. I am not and do not wish to be a public figure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rikard Bodforss'''&lt;br /&gt;
&lt;br /&gt;
Understanding of how different acquisition methods affect the system is important when examining the collected evidence and can be critical if the case ends up in a court of law. Rikard will give a hands-on demonstration of forensic artifacts from different routine tasks. The demonstration will give a basic understanding of how delicate the system is and why some acquisition methods leave a bigger footprint than others.&lt;br /&gt;
&lt;br /&gt;
Rikard Bodforss is a security advisor at Omegapoint in Gothenburg, Sweden. He has over twenty years of experience from the IT industry and most of that working with information- and IT-security. He has held positions as Global Perimeter Protection Manager and Head of Forensics within Volvo Group. Now he is working with clients from many different industries like; critical public utilities (SCADA security), banking, automotive, retail and trade. His area of expertise ranges from very technical security, like forensics, to information security governance.&lt;br /&gt;
Rikard holds a CISSP and a CISA certification, and was awarded the ISACA Thomas Fitzgerald Award in 2009 for acheiving the highest score in the world on the CISA exam. He is a very popular speaker at national and international conferences and promises to deliver a talk you do not want to miss! &lt;br /&gt;
You can follow him on Twitter @rbodforss and listen to him (in Swedish) at sakerhetspodcastem.se where he is a co-host. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'Mattias Weckstén''&lt;br /&gt;
&lt;br /&gt;
A short talk about the IT-forensic program at Halmstad university, our view of the IT-forensic investigator, courses and skills taught and the future of the trade. The talk will be concluded with an overview of a selection of previous and current thesis projects. &lt;br /&gt;
&lt;br /&gt;
Mattias is adjunct in computer engineering with a specialization in it-forensics at Halmstad University. Teaching a multitude of technical aspects of the trade of manual digital forensics. Promoting it-forensic awareness through popular science in modern media.&lt;br /&gt;
&lt;br /&gt;
 '''2012-10-29 - OWASP Göteborg - Pentest och Malware, 22e november'''&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-12-05''&lt;br /&gt;
&lt;br /&gt;
Slides finns nu tillgängliga, de finns under varje talares bio nedan.&lt;br /&gt;
&lt;br /&gt;
Den 22e november kör vi vårt novemberevent. Kvällens tema är pentestning och malware, vi har tre talare på detta event och det är garanterat nåt ni inte vill missa. Så boka er plats redan nu på [http://owaspgbg-pentest-malware.eventbrite.com/ eventbrite]. Denna gång är vår sponsor TeliaSonera och vi kommer hålla eventet i deras lokaler i Gårda. Adressinformation finns i eventbrite-länken.&lt;br /&gt;
&lt;br /&gt;
Prelimiär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor TeliaSonera&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 [Michael Boman/2Secure] - Malwareanalys som en hobby&lt;br /&gt;
&lt;br /&gt;
18:50 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:55 [Robin Blokker/FRA] - Penetrationstestning&lt;br /&gt;
&lt;br /&gt;
19:35 Bensträckare #2&lt;br /&gt;
&lt;br /&gt;
19:50 [Fredrik Sjöstrand/FRA] - Malware&lt;br /&gt;
&lt;br /&gt;
20:30 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
21:30 Eventet avslutas en gång till. Nu på allvar.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract och talarbio&lt;br /&gt;
&lt;br /&gt;
''Michael Boman''&lt;br /&gt;
&lt;br /&gt;
Som pappa till fem barn så har man varken tid eller pengar, men ändå ville jag inte lägga ner min hobby som malware-forskare. Lösningen heter automatisering, och jag tänkte förklara hur det fungerar. För tillfället så analyserar jag drygt 1 misstänkt virus/minuten, men det kan skalas upp i takt med hårdvara (så gott som linjär skalning &lt;br /&gt;
&lt;br /&gt;
Michael Boman arbetar som säkerhetskonsult för 2Secure och analyserar skadlig kod som hobby. Michael har över 10 års erfarenhet av säkerhetstestning av applikationer och infrastruktur. Michael är passionerad om data-säkerhet och gör sitt bästa för att fler skall göra rätt från början. Michael driver webbsidan [http://michaelboman.org michaelboman.org] där delar där med sig sina kunskaper och erfarenheter när han kan.&lt;br /&gt;
&lt;br /&gt;
Michaels slides: [[Media:Michael_Boman_Mart_OWASPGBG_20121122.pdf‎|Malware analysis as a hobby]]&lt;br /&gt;
&lt;br /&gt;
''Robin Blokker''&lt;br /&gt;
&lt;br /&gt;
All penetrationstestning utförs enligt &amp;quot;Best effort&amp;quot; principen med begränsade resurser. Vad är en rimlig spelplan för ett test? Vilka metoder är effektiva och vad letar man efter? Vilka gränser måste respekteras och vilka bör man som sakkunnig expert utforska eller ignorera? Hur ser man till att arbetet får maximal avkastning och att resultaten genererar verklig säkerhet i slutändan?&lt;br /&gt;
&lt;br /&gt;
Robin Blokker är säkerhetsspecialist vid FRA:s enhet för nätverkssäkerhet var han arbetar med granskningar och penetrationstester av svenska myndigheters system. Robins tekniska hemmaplan är webbsäkerhet och klient-attacker. Han betraktar sig själv som en välintegrerad hemvandrare och en aktiv del av den offentliga säkerhetsgemenskapen var han övar sig i psykologisk krigsföring och&lt;br /&gt;
frisbeegolf.&lt;br /&gt;
&lt;br /&gt;
Robins slides: [[Media:Robin_Blocker_Penetrationtesting_OWASPGBG_20121122.RobinBlokker.pdf|Penetrationstestning]]&lt;br /&gt;
&lt;br /&gt;
''Fredrik Sjöstrand''&lt;br /&gt;
&lt;br /&gt;
Malware har gått ifrån att vara ett simpelt busstreck till att tömma ditt bankkonto, ta alla dina inloggningsuppgifter och aktivt försvåra analys med anti-debug, anti-vm och obfuskering. Hur kan det se ut? Vad händer? Framtid?&lt;br /&gt;
&lt;br /&gt;
Fredrik Sjöström arbetar som reverse engineer vid FRAs informationssäkerhetsavdelning där han arbetar med att köra kod baklänges. Fokus ligger på malware analys och att hitta metoder för detektering. De lediga stunder som inte tillbringas i en debugger tillägnas Premier League och Chelsea FC. &lt;br /&gt;
&lt;br /&gt;
Fredriks slides: [[Media:Fredrik_Sjostrom_Malware_OWASPGBG_20121122.pdf‎|Malware]]&lt;br /&gt;
&lt;br /&gt;
 '''2012-10-08 - OWASP Göteborg - Introduction to Hardware Hacking part 1, 25:e Oktober, 2012'''&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-10-29''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides tillgängliga [[Media:OWASP-Hardware-Hacking-Part1.pptx‎|OWASP Hardware Hacking Part 1]]. Dessutom finns en video från spektaklet. Den hittar ni [http://t.co/9VsMeAGW här].&lt;br /&gt;
&lt;br /&gt;
''Ursprungspost 2010-10-08''&lt;br /&gt;
&lt;br /&gt;
Torsdag 25e oktober slår OWASP Göteborg och Omegapoint upp sina portar för en helkväll med hårdvarusnickeri! Till vårt stora nöje blev eventet fullbokat i princip så fort biljetterna släpptes. Ni som är intresserade men som inte fick plats kan anmäla ert intresse till [mailto:mattias.jidhage@owasp.org Mattias Jidhage]. Om tillräckligt många är intresserade finns det inget som hindrar att vi kör fler omgångar.&lt;br /&gt;
&lt;br /&gt;
Under kvällen så kommer vi kika lite på ytmontering generellt och mer specifikt på GoodFET (som är kvällens mål). Om man nu vill bygga något elektroniskt, hur gör man då? Och det här med ytmontering - kan man verkligen göra det hemma? Och varför? Vad skall man egentligen ha en GoodFET till? Vad finns det mer för intressanta säkerhetsrelaterade hårdvaruprojekt man kan pilla med? Din GoodFET får du ta med dig hem.&lt;br /&gt;
&lt;br /&gt;
 '''2012-09-13 - Slides från OWASP Göteborg 2012-09-06 finns nu tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt september-event tillgängliga. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Mikko Saario - [[Media:Mikko_Saario_3_from_1_hybrid_agile_OWASP_Gbg_20120906.pdf‎|3 från 1 - hybrid environments and agile]]&lt;br /&gt;
&lt;br /&gt;
Ulf Larson - [[Media:Securing_mobile_applications_OWASP_Gbg_20120906.pdf|Securing Mobile Applications]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-07-04 - Nästa event spikat till torsdag den 6e september - tema mobile security'''&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 6e april slår vi upp portarna till OWASP Göteborgs första event på år två! Denna gång kommer temat vara mobilsäkerhet och vi har övertalat [https://www.linkedin.com/in/mikkosaario Mikko Saario], Senior Security Manager vid Nokia att komma och köra en 3-från-1 om mobilsäkerhet och agil säkerhet. Dessutom kommer Ulf Larson att berätta kortfattat om vad OWASP kan erbjuda mobilutvecklare. Sponsor för detta event är Adecco IT Konsult. Tusen tack till Adecco IT Konsult för detta!&lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas hos Adecco IT Konsult, Maskingatan 5, 417 64 Göteborg [https://owaspgbg-mobilesec.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Mikko kommer hålla sina presentationer på engelska och det är troligt att Ulf också gör så. Denna gång blir också demointensiv och förhoppningsvis håller sig demodjävulen på behörigt avstånd...&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Adecco IT Konsult&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Securing mobile applications. What can OWASP offer, + a quick look at iGoat&lt;br /&gt;
&lt;br /&gt;
18:40 Bensträckare&lt;br /&gt;
&lt;br /&gt;
18:45 3-från-1 presentation från Mikko Saario (hybrid environments and security + agile development)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts'''&lt;br /&gt;
&lt;br /&gt;
''Securing Mobile applications. What can OWASP offer ...''&lt;br /&gt;
&lt;br /&gt;
In this talk, we look at some common security pitfalls in mobile application development. We also take a peek inside the iGoat training application, an OWASP project aimed at educating mobile developers in secure programming. Finally, we look briefly on how to you can assess the security of your backend by using burp proxy to intercept and modify your mobile phone’s traffic in transit.''&lt;br /&gt;
&lt;br /&gt;
''3-from-1 Mikko Saario''&lt;br /&gt;
&lt;br /&gt;
In the first part of the talk, Mikko will take a quick look at various hybrid environments available for ‘mobile’ app developers – showing how the ‘desktop web’ and ‘mobile web’ are converging and what kind of fundamental security mechanisms do or do not exist in them to protect the user. The second part will take a look at recent developments in the web standards bridging these two worlds even closer to each other than ever before – perhaps even making native apps … redundant at some point? Finally, switching to something completely different, Mikko will share his experiences working with an agile team and helping them build more secure products. The talks are accompanied with small demos and use cases to show some of the discussed topics in real life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-06-01 - Slides från OWASP Göteborg 2012-04-26 nu tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Nu finns slides från vårt april-event tillgängliga. Nu vet ni alltså vad ni skall göra under semestern. Varsågoda!&lt;br /&gt;
&lt;br /&gt;
Erlend Oftedal - [http://eoftedal.github.com/CrossDomainAndBrowserSecurity/#1 Cross domain communication and browser security features] &lt;br /&gt;
&lt;br /&gt;
Combitech - [[Media:OWASP_Evalg_2012-04-26.ppt‎|Security assessment of the E-valg system]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-03-25 - Jim Manico's slides tillgängliga'''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu länken till Jim Manico's slides från föredraget den 22e. Håll till godo! [[Media:Manico_Developer_Top_Ten_Core_Controls_v4.1.ppt.zip | JManico - Developer Top Ten]]&lt;br /&gt;
&lt;br /&gt;
 '''2012-03-03 - Nästa officiella event spikat till torsdag den 26e april'''&lt;br /&gt;
&lt;br /&gt;
Torsdagen den 26e april slår vi upp portarna OWASP Göteborgs sista event före sommaren. Efter detta går vi in i sommardimman och space:ar ut ett par månader innan vi återigen tar nya tag inför hösten. Sponsor för detta event är [http://www.combitech.se/ Combitech]. Tusen tack till Combitech för detta!&lt;br /&gt;
&lt;br /&gt;
Temat för aprileventet är Norge! Vi får besök av Erlend Oftedal (@webtonull) som skall berätta om ''Cross domain communication and browser security features''. Rekommenderad lyssning för er som använder webbläsare. Vi har också ett team från Combitech som skall berätta om säkerhetsarbetet bakom framtagningen av E-valg, elektroniska val i Norge. Garanterat spännande lyssning det med! &lt;br /&gt;
&lt;br /&gt;
Denna gång kommer eventet att hållas på ''Utbildningscenter för kollektivtrafik, Bror Nilssons gata 16, 417 55 Göteborg'' Håll ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
Preliminär agenda:&lt;br /&gt;
&lt;br /&gt;
17:30 Eventet öppnar. Mackor och dricka. Ett par ord från vår sponsor Combitech&lt;br /&gt;
&lt;br /&gt;
18:00 Community update&lt;br /&gt;
&lt;br /&gt;
18:10 Security assessment of the E-valg system - Combitech&lt;br /&gt;
&lt;br /&gt;
19:05 Bensträckare&lt;br /&gt;
&lt;br /&gt;
19:15 Cross domain communication and browser security features - Erlend Oftedal (presentation och slides är på engelska)&lt;br /&gt;
&lt;br /&gt;
20:10 Mingel, en öl eller två och lite snacks&lt;br /&gt;
&lt;br /&gt;
Ca 21:00 Eventet avslutas&lt;br /&gt;
&lt;br /&gt;
'''Abstracts:'''&lt;br /&gt;
&lt;br /&gt;
''Security assessment of the E-valg system''&lt;br /&gt;
&lt;br /&gt;
Norge har under hösten 2011 genomfört elektroniska val med ett nyframtaget system som kallas för E-valg. Säkerheten i ett sådant system är naturligtvis mycket viktig för att kunna genomföra fria val med lika rösträtt och där man kan hålla hemligt vad man röstar på. Ett viktigt krav är att man ska kunna avge sin röst utan att rösten kan kopplas till väljaren, man ska vara säker på att rösten har blivit registrerad på rätt kandidat och parti och endast en röst per person ska räknas. Ett annat krav är att ingen ska kunna forcera systemets säkerhet för att påverka valresultatet (integritet) eller ta reda på vad någon har röstat på (sekretess). &lt;br /&gt;
Säkerhetsarbetet har varit en viktig del i framtagningen av E-valg och varit del av alla faser (iterationer) av projektet. Combitech har haft rollen som oberoende säkerhetsgranskare och utfört granskning av design, kodgranskning och penetrationstester på det färdiga systemet. I princip all information om systemet är dessutom öppen för att göra det möjligt för alla som vill att granska säkerheten.&lt;br /&gt;
Presentationen kommer att beskriva principerna i säkerhetslösningen och hur säkerhetsgranskning och penetrationstest har utförts.&lt;br /&gt;
&lt;br /&gt;
''Cross domain communication and browser security features''&lt;br /&gt;
&lt;br /&gt;
Developers frequently see the need to be able to request data from several sources on different domains.&lt;br /&gt;
Traditionally this has been solved in many ways, some of them not very secure. We will take a look at&lt;br /&gt;
some of these approaches, why they are flawed, and why the new approaches are better. We will also&lt;br /&gt;
look at common mistakes made when setting up cross domain communication.&lt;br /&gt;
We will also take a look at some of the new browser security features, and how these support cross&lt;br /&gt;
domain communication and can help mitigate other security problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-03-03 - Jim &amp;quot;@manicode&amp;quot; Manico till Sverige'''&lt;br /&gt;
&lt;br /&gt;
Jim Manico är på nordisk turné för att bland annat berätta om hur man skyddar sig mot Cross-site scripting. Den 22e mars landar Jim i Göteborg för att 18:00 hålla en presentation i Chalmers kårhus. Det kommer finnas mackor, öl, snacks och dricka. Mer info kommer allt eftersom den blir tillgänglig. Håll också ögonen öppna för Eventbrite-länk.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-03-12''&lt;br /&gt;
&lt;br /&gt;
Här kommer nu Jims abstract och länken till anmälan via [http://owaspgbg-manico.eventbrite.com/ Eventbrite].&lt;br /&gt;
&lt;br /&gt;
Jim Manico is a profile in the OWASP community, working with the OWASP podcasts and ESAPI amongst other things. During March he is doing a Nordic tour and will be visiting the chapters in Finland, Sweden, Norway and Denmark and we have the pleasure of welcoming him to Gothenburg on March 22.&lt;br /&gt;
&lt;br /&gt;
Chalmers University of Technology is sponsoring the venue and will also provide some light snacks, coffee beer as well as non-alcoholic drinks. Jim's visit is made possible thanks to F5.&lt;br /&gt;
&lt;br /&gt;
Please note that the event will be held in '''English'''.&lt;br /&gt;
&lt;br /&gt;
Abstract: Web Application Access Control Design Excellence&lt;br /&gt;
Access Control is a necessary security control at almost every layer within a web application. This talk will discuss several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns include hard-coded security policies, lack of horizontal access control, and &amp;quot;fail open&amp;quot; access control mechanisms.&lt;br /&gt;
&lt;br /&gt;
In reviewing these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual, activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust web-based access-control mechanism.&lt;br /&gt;
&lt;br /&gt;
 '''2012-02-27 - Snabbt påkommen säkpub'''&lt;br /&gt;
&lt;br /&gt;
Vi tänkte att vi skulle avrunda februari med en tämligen snabbt påkommen säkpub. Åtminstone någon av oss i boardet kommer finnas på [http://olrepubliken.se Ölrepubliken] under denna veckas torsdagskväll (29e februari, alltså) om någon vill titta in en stund. Tilläggas kan att det ryktas om att ett öl kallat Ctrl Alt Delete (jodå, ni läste rätt) skall finnas i lokalen under sagda torsdagskväll. Väl mött!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-02-25 - Missa inte dev:mobile'''&lt;br /&gt;
&lt;br /&gt;
En utvecklarkonferens för mobilutveckling ([http://devmobile.se dev:mobile]) kommer att gå av stapeln i Göteborg den 12e juni. Säkerligen har några av er börjat fundera kring säkerhetsproblem för mobila applikationer och har ni något intressant och/eller spännande att dela med er av skulle jag rekommendera att ni skickar in ert abstract till info@devmobile.se före 16 mars. Som inspiration kan ni titta på [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] och dess relaterade sidor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-02-06 - Öppningsceremoni för Software Center'''&lt;br /&gt;
&lt;br /&gt;
Den förträfflige säkerhetsforskaren Andrei Sabelfeld bad mig att meddela den intresserade communitymedlemmen (japp, det är Du) att Software Center officiellt öppnar på tisdagen den 14e februari. Arrangören har dessutom haft den goda smaken att välja Kuggen på Lindholmen för ceremonin. Dessutom utlovas både tal och poster presentationer av intressant och aktuell forskning. Kort sagt, det finns ingen anledning att inte gå dit. Här kommer [http://www.lindholmen.se/en/node/22046 länken]. Vi ses där! &lt;br /&gt;
&lt;br /&gt;
 '''2012-01-17 - Communityhack'''&lt;br /&gt;
&lt;br /&gt;
Nu går det bra att anmäla sig till OWASP Göteborgs communityhack som går av stapeln 18e februari på Chalmers. Mer info hittar ni på [http://communityhack-feb-2012.eventbrite.com/ Eventbrite], där ni även kan anmäla er. Vi ses där!&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-02-12''&lt;br /&gt;
&lt;br /&gt;
Adressen är Rännvägen 4. Följ [https://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=r%C3%A4nnv%C3%A4gen+4,+g%C3%B6teborg,+sverige&amp;amp;aq=&amp;amp;sll=57.687406,11.979418&amp;amp;sspn=0.051477,0.154324&amp;amp;vpsrc=0&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=R%C3%A4nnv%C3%A4gen+4,+412+58+G%C3%B6teborg,+Sweden&amp;amp;ll=57.688311,11.97808&amp;amp;spn=0.006434,0.01929&amp;amp;t=m&amp;amp;z=16&amp;amp;iwloc=A denna länk] för att hitta dit.&lt;br /&gt;
&lt;br /&gt;
Det kommer finnas en person på plats för att släppa in er från ca 08:45.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-30''&lt;br /&gt;
&lt;br /&gt;
Det är nu klart att det serveras frukost på communityhacket.&lt;br /&gt;
&lt;br /&gt;
''Uppdatering 2012-01-27''&lt;br /&gt;
&lt;br /&gt;
Tusen tack [[File:Omegapoint_logo.png|100px]] som står för pizza och dricka. Vill ditt företag också synas på denna sida så kontakta någon av oss. Epostadresserna finns ovan.&lt;br /&gt;
&lt;br /&gt;
Vill du skylta med ditt kommande projekt inför communityhacket redan nu? Gå in på [http://www.insto.org/communityhack/index.php/Main_Page Projektwikisidan] och lägg in era förslag. Ett par förslag har redan ramlat in!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2012-01-17 - Så där ja!'''&lt;br /&gt;
&lt;br /&gt;
Då har vi bokat Erlend Oftedal (@webtonull) till vårt april-event. Sök på Erlend så ser ni själva vilken kanonbokning vi gjort! &lt;br /&gt;
&lt;br /&gt;
I skuggan av detta har vi dessutom bekräftat lokal till vårt communityhack. Lunchrummet på 7e våningen i D&amp;amp;IT-huset på Chalmers. Tack Chalmers och D&amp;amp;IT!&lt;br /&gt;
&lt;br /&gt;
 '''2012-01-16 - Vårens aktiviteter'''&lt;br /&gt;
&lt;br /&gt;
Väl mött!&lt;br /&gt;
&lt;br /&gt;
Vi har, julen till trots, inte riktigt bara legat på sofflocket och slöat. Vi har flera aktiviteter på gång. Bland annat kommer Jim Manico(!) på Norden-turné och OWASP Göteborg kommer att arrangera en presentationskväll med Jim längre fram i mars! &lt;br /&gt;
Inte nog med det. Ett communityhack kommer att gå av stapeln i mitten på februari. Hacket kommer hållas på Chalmers, mycket sannolikt i D&amp;amp;ITs förträffliga lunchrum på 7e våningen. Inte fy skam alls!&lt;br /&gt;
&lt;br /&gt;
Till allt detta kommer en ordinare presentationskväll i april och som om inte allt detta är nog går ryktet att en mycket känd och otroligt spännande säkerhetsforskare kommer befinna sig i Sverige längre fram i vår. Givetvis kommer OWASP att göra sitt yttersta för att blanda sig i detta besök och kanalisera det ut till Er!&lt;br /&gt;
&lt;br /&gt;
Stay tuned!&lt;br /&gt;
&lt;br /&gt;
 '''2011-11-04 - Ett par små uppdateringar'''&lt;br /&gt;
&lt;br /&gt;
Riktigt kul igår! Har man grymma talare, intressanta diskussioner och 55 personer i lokalen. Då är det rätt svårt att misslyckas...&lt;br /&gt;
&lt;br /&gt;
Slides från gårdagens träff kommer att publiceras här så fort de blir tillgängliga.&lt;br /&gt;
&lt;br /&gt;
Nästa träff är ett community hack, preliminärt schemalagt till 18-19 februari. Community-hacket skiljer sig från de presentations-orienterade kvällsträffarna. Här dyker du upp med din laptop, penna, papper och möjligen en påse ideer som du funderat över. Sen hackar vi loss så mycket vi orkar och ser vart det slutar! Tänk på att det finns inget som säger att du måste koda php, linuxmoduler eller regexpar för att få utbyte. Har du nån kul ide om ett alternativt sätt att genomföra en hotmodellering eller vill testa hur ZAP fungerar är det fritt fram. &lt;br /&gt;
&lt;br /&gt;
För att genomföra denna träff skull vi behöva Er hjälp. Vi behöver en '''samarrangör''' och '''en eller flera sponsorer'''. Känner du att just ditt företag skulle vara intresserad av att ställa upp, kontakta oss. Tillförordnad general för detta event är Erik (erik.brannstrom@gmail.com).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2011-10-18 - Meeting outline for November 3rd'''&lt;br /&gt;
&lt;br /&gt;
17:00 - 17:30 Startup mingle with food and some drinks&lt;br /&gt;
&lt;br /&gt;
17:30 - 17:45 Community update&lt;br /&gt;
&lt;br /&gt;
17:45 - 18:30 OWASP Hatkit (presented in English)&lt;br /&gt;
&lt;br /&gt;
18:30 - 18:45 Short break&lt;br /&gt;
&lt;br /&gt;
18:45 - 19:45 DOMinator (presented in English)&lt;br /&gt;
&lt;br /&gt;
[19:45 - 20:30 After event mingle]&lt;br /&gt;
&lt;br /&gt;
Lets have a beer or two and talk security!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 19:30, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talarinformation/Presenter information'''&lt;br /&gt;
&lt;br /&gt;
''Martin Holst Swende''&lt;br /&gt;
&lt;br /&gt;
Martin Holst Swende is a security consultant at the Swedish company 2Secure, where he primarily is involved with application security testing, but also does network penetration testing, IT forensics and source code auditing. Martin has a background as an Ms.C in Computer Science and Engineering from Linköping University and worked as a software developer for among others Yahoo before entering the field of security. Martin is the project leader for the Owasp Hatkit and the Owasp Hatkit Datafiddler projects.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
The Hatkit Project was created to provide a framework for web application security testing. It consists of two parts; the Hatkit Proxy and the Hatkit Datafiddler. The proxy is a minimalist intercepting proxy which records data to a MongoDB database, while the Datafiddler is a tool to view, sort, filter, aggregate, replay and analyse data through a lot of different mechanisms, with the aim of providing a highly customizable framework which can be used to analyse modern complex web applications. &lt;br /&gt;
The tools became Owasp projects in 2011.&lt;br /&gt;
&lt;br /&gt;
Martin's slides: [[Media:Martin_Swende-Hatkit_Owasp-Gothenburg.pdf|OWASP Hatkit]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Stefano Di Paola''&lt;br /&gt;
&lt;br /&gt;
Stefano Di Paola is the CTO and a cofounder of Minded Security, where  he is responsible for the Research and Development Lab. Prior to founding Minded Security, Stefano was a freelance security consultant, working for several private and public companies. He also worked in collaboration with University of Florence at the Faculty of Computer Engineering. Stefano is recognized as one of the top application security researchers. In past years he released several cutting edge security advisories and researches presented at several international events  (Flash application security testing, Subverting Ajax). He is the Research &amp;amp; Development Director of OWASP Italian Chapter and contributor to several chapters of the OWASP testing guide.&lt;br /&gt;
&lt;br /&gt;
Presentation abstract&lt;br /&gt;
&lt;br /&gt;
Cross Site Scripting is one of the most difficult issues to fix since it involves several contexts on different platforms. And it is well known. With the advent of complex web application with heavy client side programming, DOM based Cross Site Scripting is becoming more and more interesting in the application security field. The difference between vanilla Xss and the latter is how hard is to find issues among thousands of JavaScript lines of code, and how contexts and attacks move from classical HTML format and client side execution to programming logic and paradigms. This talk will try to fill the emptiness of awareness about DOM Xss by showing new attacks and a new analysis technique whose implementation is a tool named &amp;quot;DOMinator&amp;quot;. DOMinator is a Firefox based application that can ease the pain of finding DOM based Cross Site Scripting issues by using runtime tainting analysis at JavaScript level.&lt;br /&gt;
&lt;br /&gt;
Stefano's slides: [[Media:AnalyzingDOMXssWithDOMinator.pdf| DOMinator]] &lt;br /&gt;
&lt;br /&gt;
 '''2011-10-14 - OWASP Göteborg den 3e november - uppdatering'''&lt;br /&gt;
&lt;br /&gt;
Nu är sponsor fixad och vi har någonstans att vara och mat att äta! Nu finns det alltså INGA hinder för att anmäla er. Kom ihåg, först till kvarn gäller även denna gång! Mötet kommer denna gång att hållas helt på engelska/the meeting will be held in its entirety in English och innehåller presentationer av Stefano Di Paola och Martin Holst Swende.&lt;br /&gt;
&lt;br /&gt;
Mötet kommer denna gång att sponsras av Adecco IT &amp;amp; Engineering och hållas på Götgatan 11, 41105 Göteborg (mitt i Nordstan). Mötet startar 17:00 och slutar runt 20:00, följt av öl och mingel. För att anmäla dig till mötet ber vi dig besöka/To sign up for the event, please visit [http://owaspgbg-nov2011.eventbrite.com/ Eventbrite]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''2011-09-17 - OWASP Göteborg den 3e november'''&lt;br /&gt;
&lt;br /&gt;
Vi har spikat datum för nästa träff till den tredje november. Denna träff kommer innehålla presentationer av Stefano Di Paola och Martin Holst Swende. Vi jagar för närvarande sponsorer och har därför ingen plats bestämd än. Är Ditt företag intresserat av att sponsra en denna träff är ni välkomna att höra av er till Ulf eller Mattias! &lt;br /&gt;
&lt;br /&gt;
Att vi inte har någon plats än skall dock inte få förhindra någon att anmäla sig, så det är bara att sätta igång. Anmälningsformuläret finns [http://owaspgbg-nov2011.eventbrite.com/ här]. &lt;br /&gt;
&lt;br /&gt;
 '''2011-09-17 - Ännu ett wow!'''&lt;br /&gt;
&lt;br /&gt;
Vi har det stora nöjet att presentera vår andra spikade talare för vår nästa träff! Denna person är ingen mindre än Martin Holst Swende. Martin har utvecklat verktyget OWASP Hatkit och även presenterat detta på DEFCON 19 i år. Martin har utlovat en demobaserad presentation som garanterat kommer att bli både spännande och lärorik! Därav ännu ett wow! &lt;br /&gt;
&lt;br /&gt;
 '''Nästa träff + wow!'''&lt;br /&gt;
&lt;br /&gt;
Det ser ut som om vi har spikat första talaren till nästa träff (tack Jonas!). Denna person är ingen mindre än Stefano Di Paola, a.k.a WisecWisec, a.k.a mannen bakom DOMinator. Därav wow! &lt;br /&gt;
&lt;br /&gt;
Det lutar också åt att nästa träff kommer att hållas den tredje november. Mer information kommer allt eftersom. Stay tuned och prelboka upp tredje november för OWASP-träff redan nu! &lt;br /&gt;
&lt;br /&gt;
 '''Presentationsmaterial'''&lt;br /&gt;
&lt;br /&gt;
Presentationsmaterial kommer att länkas till från denna sida i anslutning till våra träffar. &lt;br /&gt;
&lt;br /&gt;
 '''OWASP Gothenburg web site goes Swedish + surprise!'''&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs webbsida (den här alltså) kommer från idag att i huvudsak vara på svenska. Vi vänder oss till största del till svensktalande och har därför valt att använda svenska som språk. Det innehåll som redan fanns på sidan (före 11 augusti 2011) kommer att fortsätta vara på engelska. Viss generell information kommer att översättas. &lt;br /&gt;
&lt;br /&gt;
Överraskning! OWASP Göteborg kommer att göra en kort videoinspelning där vi skickar &amp;quot;en hälsning från Göteborgskapitlet&amp;quot;. Denna hälsning, tillsammans med hälsningar från andra kapitel kommer att visas upp på OWASP AppSecUSA senare i höst. Själva överraskningen består i att vi har tänkt att spela in videosnutten under vårt möte den 25e augusti. Detta innebär också att alla som deltar på mötet också får vara med och medverka i hälsningsvideon. De ni&amp;amp;nbsp;;-) &lt;br /&gt;
&lt;br /&gt;
 '''OWASP Gothenburg Meeting, August 25 2011''', '''Welcome to Owasp Gothenburg''' + '''Owasp top ten w/ demo''' + '''Webappsec from a programming language perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Meeting agenda''' &lt;br /&gt;
&lt;br /&gt;
''17:00 - 17:30, Welcome and sandwiches'' &lt;br /&gt;
&lt;br /&gt;
''17:30 - 17:45, OWASP Gothenburg Local Chapter - who are we, what do we do?'' &lt;br /&gt;
&lt;br /&gt;
Introduction to the Gothenburg chapter, co-Leaders and Board-members, and the vision for making Gothenburg to a more interesting place for people interested in security. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''17:45 - 18:45, OWASP Top 10 - DEMO'' &lt;br /&gt;
&lt;br /&gt;
Per Josefsson and Ulf Larson walks through the latest version of the top list and demonstrates a few of the attacks. &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 is a list of the ten most dangerous threats with respect to application security. The latest version is from 2010 and the next version is expected during 2013. &lt;br /&gt;
&lt;br /&gt;
Pers slides: [[Media:Per_Josefsson_OWASP_Topp_Tio_20110825.ppt|OWASP Top Ten]] &lt;br /&gt;
&lt;br /&gt;
''18:45 - 19:00, Short break'' &lt;br /&gt;
&lt;br /&gt;
''19:00 - 19:30, Web application security from a programming language perspective'' &lt;br /&gt;
&lt;br /&gt;
15 years ago the concept of &amp;quot;Same-Origin Policy&amp;quot; (SOP) was introduced. SOP controls the interaction between web browser components. Current web applications differ radically in how they interact and they also use certain &amp;quot;hacks&amp;quot; to bypass the outdated policy. Jonas Magazinius introduces ongoing research at Chalmers University regarding programming language security and how a fine granular policy can replace SOP by allowing more interaction without compromising security. &lt;br /&gt;
&lt;br /&gt;
Jonas slides: [[Media:Jonas_Magazinius_OWASP_Appsec_Proglang_20110825.pptx|A Language-based Perspective on Web Application Security]] &lt;br /&gt;
&lt;br /&gt;
''19:30 - 20:30, Beer'' &lt;br /&gt;
&lt;br /&gt;
[http://www.omegapoint.se Omegapoint] are sponsors and there will be lighter food and beers. Omegapoint is located at Rosenlundsgatan 3, Göteborg. The event will start at 5 pm and end around 8 pm. To sign up for the event, please visit [http://owaspgbg-aug2011.eventbrite.com/ this] site. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 4th, 2011 - OWASP-Gothenburg opens!'''&lt;br /&gt;
&lt;br /&gt;
Finally, OWASP Gothenburg has been formed, bringing application security closer to developers and security professionals on the west coast of Sweden. Ulf, Mattias and Jonas, the local chapter leaders, welcome members! &lt;br /&gt;
&lt;br /&gt;
== Deltagande  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation is a professional association of global members and is and open to anyone interested in learning more about application security. Local chapters are run independently and governed by the following [[Chapter Leader Handbook]]. As a [http://www.owasp.org/index.php/About_OWASP 501(c)(3)] non-profit professional association your support and sponsorship of a meeting venue and/or refreshments is tax-deductible. Financial contributions should be made online using the online chapter donation button. To be a '''SPEAKER''' at ANY OWASP Chapter in the world simply review the [http://www.owasp.org/index.php/Speaker_Agreement speaker agreement] and then contact the local chapter leader with details of what [http://www.owasp.org/index.php/Category:OWASP_Project OWASP PROJECT], independent research or related software security topic you would like to present on. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Gothenburg&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;center&amp;gt;[http://lists.owasp.org/mailman/listinfo/owasp-sweden Klicka här för att gå med i din lokalavdelnings mailinglista]&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Stop remove here&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Anmäl Er gärna till vår mailinglista. '''Notera''' dock att när du anmäler dig kommer du att anmäla dig till OWASP ''Sweden''-listan och inte ''Gothenburg''-listan. Detta beror på att Göteborgs och Sverige-kapitlen tillsammans har bestämt oss för att endast använda en lista. &lt;br /&gt;
&lt;br /&gt;
Vem som helst är välkommen till våra möten (det enda som krävs för deltagande är att du har gått med i OWASP Sweden-mailinglistan). Är du intresserad av att hjälpa till eller har förslag på spännande och intressanta föredrag och/eller talare är du välkommen att kontakta oss. &lt;br /&gt;
&lt;br /&gt;
== OWASP Sverige-bloggen  ==&lt;br /&gt;
&lt;br /&gt;
För längre nyhetsinlägg och rapporter från konferenser och annat hänvisar vi till [http://owaspsweden.blogspot.com/ OWASP Sverige-bloggen]. &lt;br /&gt;
&lt;br /&gt;
== OWASP Göteborgs vision  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Göteborgs vision är att väcka intresse för och sprida kunskap om hur man bygger säkra mjukvarusystem. Den är att tillhandahålla en balanserad mix av de senaste rönen inom akademisk säkerhetsforskning (spets och framkant), etablerade säkerhetstekniker och designprinciper för direkt tillämpning (bredd och mogenhet). De viktigaste elementen i konstruktionen av säkra applikationer är design och utvecklingsmetodik. OWASP Göteborg skall därför bidra till att öka säkerhetstänkandet hos programvaruutvecklare. &lt;br /&gt;
&lt;br /&gt;
OWASP Göteborg når ut till utvecklare, projektledare och säkerhetspersoner genom att erbjuda intressanta föredrag och demonstrationer kring säkerhet - både i stort och i smått. Communityhack-dagar, mingel, inhemska och utländska talare profilerar oss som en seriös aktör som erbjuder intresserade en mötesplats där de kan träffa likasinnade, utbyta idéer samt diskutera de senaste inom området. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]] [[Category:Sweden]] [[Category:Gothenburg]]&lt;/div&gt;</summary>
		<author><name>Peter Magnusson</name></author>	</entry>

	</feed>