<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rajivvishwa</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rajivvishwa"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rajivvishwa"/>
		<updated>2026-04-30T08:50:09Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cryptographic_Storage_Cheat_Sheet&amp;diff=222314</id>
		<title>Cryptographic Storage Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cryptographic_Storage_Cheat_Sheet&amp;diff=222314"/>
				<updated>2016-10-11T05:19:45Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: Updated NIST publication link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing solutions to protect data at rest.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Architectural Decision  ==&lt;br /&gt;
&lt;br /&gt;
An architectural decision must be made to determine the appropriate method to protect data at rest.  There are such wide varieties of products, methods and mechanisms for cryptographic storage. This cheat sheet will only focus on low-level guidelines for developers and architects who are implementing cryptographic solutions. We will not address specific vendor solutions, nor will we address the design of cryptographic algorithms.&lt;br /&gt;
&lt;br /&gt;
= Providing Cryptographic Functionality  =&lt;br /&gt;
&lt;br /&gt;
== Secure Cryptographic Storage Design  ==&lt;br /&gt;
&lt;br /&gt;
* All protocols and algorithms for authentication and secure communication should be well vetted by the cryptographic community.&lt;br /&gt;
&lt;br /&gt;
* Ensure certificates are properly validated against the hostnames/users ie whom they are meant for.&lt;br /&gt;
&lt;br /&gt;
* Avoid using wildcard certificates unless there is a business need for it &lt;br /&gt;
&lt;br /&gt;
* Maintain a cryptographic standard to ensure that the developer community knows about the approved ciphersuits for network security protocols, algorithms, permitted use, cryptoperiods and Key Management&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Rule - Only store sensitive data that you need ===&lt;br /&gt;
&lt;br /&gt;
Many eCommerce businesses utilize third party payment providers to store credit card information for recurring billing. This offloads the burden of keeping credit card numbers safe.&lt;br /&gt;
&lt;br /&gt;
=== Rule - Use strong approved Authenticated Encryption  ===&lt;br /&gt;
E.g. [http://en.wikipedia.org/wiki/CCM_mode CCM] or [http://en.wikipedia.org/wiki/GCM_mode GCM] are approved [http://en.wikipedia.org/wiki/Authenticated_encryption Authenticated Encryption] modes based on [http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES] algorithm.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Use strong approved cryptographic algorithms ====&lt;br /&gt;
Do not implement an existing cryptographic algorithm on your own, no matter how easy it appears. Instead, use widely accepted algorithms and widely accepted implementations. &lt;br /&gt;
&lt;br /&gt;
Only use approved public algorithms such as AES, RSA public key cryptography, and SHA-256 or better for hashing. Do not use weak algorithms, such as MD5 or SHA1. Avoid hashing for password storage, instead use PBKDF2, bcrypt or scrypt. Note that the classification of a &amp;quot;strong&amp;quot; cryptographic algorithm can change over time. See [http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf NIST approved algorithms] or ISO TR 14742 “Recommendations on Cryptographic Algorithms and their use” or [http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/algorithms-key-size-and-parameters-report-2014/at_download/fullReport Algorithms, key size and parameters report – 2014] from European Union Agency for Network and Information Security. &lt;br /&gt;
E.g. [http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES] 128, [http://en.wikipedia.org/wiki/RSA_(cryptosystem) RSA] 3072, [http://en.wikipedia.org/wiki/Secure_Hash_Algorithm SHA] 256. &lt;br /&gt;
&lt;br /&gt;
Ensure that the implementation has (at minimum) had some cryptography experts involved in its creation. If possible, use an implementation that is FIPS 140-2 certified. &lt;br /&gt;
&lt;br /&gt;
See [http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf NIST approved algorithms] Table 2 “Comparable strengths” for the strength (“security bits”) of different algorithms and key lengths, and how they compare to each other. &lt;br /&gt;
&lt;br /&gt;
* In general, where different algorithms are used, they should have comparable strengths e.g. if an AES-128 key is to be encrypted, an AES-128 key or greater, or RSA-3072 or greater could be used to encrypt it. &lt;br /&gt;
* In general, hash lengths are twice as long as the security bits offered by the symmetric/asymmetric algorithm&amp;amp;nbsp; e.g. SHA-224 for 3TDEA (112 security bits) (due to the [http://en.wikipedia.org/wiki/Birthday_attack Birthday Attack])&lt;br /&gt;
&lt;br /&gt;
If a password is being used to protect keys then the [http://en.wikipedia.org/wiki/Password_strength password strength]should be sufficient for the strength of the keys it is protecting.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Use approved cryptographic modes  ====&lt;br /&gt;
In general, you should not use AES, DES or other symmetric cipher primitives directly. [http://csrc.nist.gov/groups/ST/toolkit/BCM/current_modes.html NIST approved modes] should be used instead. &lt;br /&gt;
&lt;br /&gt;
NOTE: Do not use [http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Electronic_codebook_.28ECB.29 ECB mode] for encrypting lots of data (the other modes are better because they chain the blocks of data together to improve the data security).&lt;br /&gt;
&lt;br /&gt;
==== Rule - Use strong random numbers  ====&lt;br /&gt;
Ensure that all random numbers, especially those used for cryptographic parameters (keys, IV’s, MAC tags), random file names, random GUIDs, and random strings are generated in a cryptographically strong fashion. &lt;br /&gt;
&lt;br /&gt;
Ensure that random algorithms are seeded with sufficient entropy.&lt;br /&gt;
&lt;br /&gt;
Tools like [http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html NIST RNG Test tool] (as used in PCI PTS Derived Test Requirements) can be used to comprehensively assess the quality of a Random Number Generator by reading e.g. 128MB of data from the RNG source and then assessing its randomness properties with the tool.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Use Authenticated Encryption of data ====&lt;br /&gt;
Use ([http://en.wikipedia.org/wiki/Authenticated_encryption AE]) modes under a uniform API. Recommended modes include [http://en.wikipedia.org/wiki/CCM_mode CCM], and [http://en.wikipedia.org/wiki/Galois/Counter_Mode GCM] as these, and only these as of November 2014, are specified in [http://csrc.nist.gov/groups/ST/toolkit/BCM/current_modes.html NIST approved modes], ISO IEC 19772 (2009) &amp;quot;Information technology — Security techniques — Authenticated encryption&amp;quot;, and [http://en.wikipedia.org/wiki/IEEE_P1619 IEEE P1619 Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices] &lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Authenticated_encryption Authenticated Encryption] gives [http://en.wikipedia.org/wiki/Confidentiality confidentiality],&amp;amp;nbsp;[http://en.wikipedia.org/wiki/Data_integrity integrity], and&amp;amp;nbsp;[http://en.wikipedia.org/wiki/Authentication authenticity] (CIA); encryption alone just gives confidentiality. Encryption must always be combined with message integrity and authenticity protection. Otherwise the ciphertext may be vulnerable to manipulation causing changes to the underlying plaintext data, especially if it's being passed over untrusted channels (e.g. in an URL or cookie). &lt;br /&gt;
* These modes require only one key. In general, the tag sizes and the IV sizes should be set to maximum values.&lt;br /&gt;
&lt;br /&gt;
If these recommended [http://en.wikipedia.org/wiki/Authenticated_encryption AE] modes are not available&lt;br /&gt;
&lt;br /&gt;
* combine encryption in [http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher-block_chaining_.28CBC.29 cipher-block chaining (CBC) mode] with post-encryption message authentication code, such as [http://en.wikipedia.org/wiki/HMAC HMAC] or [http://en.wikipedia.org/wiki/CMAC CMAC] i.e. Encrypt-then-MAC. &lt;br /&gt;
** Note that Integrity and Authenticity are preferable to Integrity alone i.e. a MAC such as HMAC-SHA256 or HMAC-SHA512 is a better choice than SHA-256 or SHA-512.&lt;br /&gt;
* Use 2 independent keys for these 2 independent operations. &lt;br /&gt;
* Do not use [http://en.wikipedia.org/wiki/CBC-MAC#Security_with_fixed_and_variable-length_messages CBC MAC for variable length data] &lt;br /&gt;
* The [http://csrc.nist.gov/groups/STM/cavp/index.html CAVP program] is a good default place to go for validation of cryptographic algorithms when one does not have AES or one of the authenticated encryption modes that provide confidentiality and authenticity (i.e., data origin authentication) such as CCM, EAX, CMAC, etc. For Java, if you are using SunJCE that will be the case. The cipher modes supported in JDK 1.5 and later are CBC, CFB, CFBx, CTR, CTS, ECB, OFB, OFBx, PCBC. None of these cipher modes are authenticated encryption modes. (That's why it is added explicitly.) If you are using an alternate JCE provider such as Bouncy Castle, RSA JSafe, IAIK, etc., then these authenticated encryption modes should be used.&lt;br /&gt;
&lt;br /&gt;
Note: [http://en.wikipedia.org/wiki/Disk_encryption_theory Disk encryption]&amp;amp;nbsp;is a special case of&amp;amp;nbsp;[http://en.wikipedia.org/wiki/Data_at_Rest data at rest]&amp;amp;nbsp;e.g. Encrypted File System on a Hard Disk Drive. [http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf XTS-AES mode] is optimized for Disk encryption and is one of the [http://csrc.nist.gov/groups/ST/toolkit/BCM/current_modes.html NIST approved modes]&amp;lt;nowiki&amp;gt;; it provides confidentiality and some protection against data manipulation (but not as strong as the &amp;lt;/nowiki&amp;gt;[http://en.wikipedia.org/wiki/Authenticated_encryption AE] [http://csrc.nist.gov/groups/ST/toolkit/BCM/current_modes.html NIST approved modes]). It is also specified in [http://en.wikipedia.org/wiki/IEEE_P1619 IEEE P1619 Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices]&lt;br /&gt;
&lt;br /&gt;
=== Rule - Store a one-way and salted value of passwords ===&lt;br /&gt;
&lt;br /&gt;
Use PBKDF2, bcrypt or scrypt for password storage. For more information on password storage, please see the [[Password Storage Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
=== Rule - Ensure that the cryptographic protection remains secure even if access controls fail ===&lt;br /&gt;
&lt;br /&gt;
This rule supports the principle of defense in depth. Access controls (usernames, passwords, privileges, etc.) are one layer of protection. Storage encryption should add an additional layer of protection that will continue protecting the data even if an attacker subverts the database access control layer.&lt;br /&gt;
&lt;br /&gt;
=== Rule - Ensure that any secret key is protected from unauthorized access ===&lt;br /&gt;
&lt;br /&gt;
==== Rule - Define a key lifecycle ====&lt;br /&gt;
&lt;br /&gt;
The key lifecycle details the various states that a key will move through during its life. The lifecycle will specify when a key should no longer be used for encryption, when a key should no longer be used for decryption (these are not necessarily coincident), whether data must be rekeyed when a new key is introduced, and when a key should be removed from use all together.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Store unencrypted keys away from the encrypted data ====&lt;br /&gt;
&lt;br /&gt;
If the keys are stored with the data then any compromise of the data will easily compromise the keys as well. Unencrypted keys should never reside on the same machine or cluster as the data.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Use independent keys when multiple keys are required ====&lt;br /&gt;
&lt;br /&gt;
Ensure that key material is independent. That is, do not choose a second key which is easily related to the first (or any preceeding) keys.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Protect keys in a key vault ====&lt;br /&gt;
&lt;br /&gt;
Keys should remain in a protected key vault at all times. In particular, ensure that there is a gap between the threat vectors that have direct access to the data and the threat vectors that have direct access to the keys. This implies that keys should not be stored on the application or web server (assuming that application attackers are part of the relevant threat model).&lt;br /&gt;
&lt;br /&gt;
==== Rule - Document concrete procedures for managing keys through the lifecycle ====&lt;br /&gt;
&lt;br /&gt;
These procedures must be written down and the key custodians must be adequately trained.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Build support for changing algorithms and keys when needed ====&lt;br /&gt;
&lt;br /&gt;
If keys are compromised or an external authority expires them, key changes will be needed.  Application polices or emergency needs will force application administrators to rotate keys and potentially rekey data at some point. It's best to be prepared to rapidly handle this need when necessary.  Including a key version and encryption algorithm version with the encrypted data is a useful, proactive feature.  For instance, including a simple prefix string, such as &amp;quot;&amp;lt;code&amp;gt;{1,1}...&amp;lt;/code&amp;gt;&amp;quot;, prior to the encrypted data could indicate algorithm version 1, key version 1.  This allows for an &amp;quot;online&amp;quot; change to the encryption algorithm and key without re-encrypting all existing data all at once.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Document concrete procedures to handle a key compromise ====&lt;br /&gt;
&lt;br /&gt;
Ensure operations staff have the information they need, readily available, when rotation of encryption keys must be performed.  Rotating keys should not require changes to source code or other risky deployment measures, since doing this in the middle of an incident will already place a great deal of stress on these staff.&lt;br /&gt;
&lt;br /&gt;
==== Rule - Limit quantity of data encrypted with one key ====&lt;br /&gt;
&lt;br /&gt;
If the amount of data encrypted grows beyond a '''certain threshold''', a new key should be used.  This '''certain threshold''' varies depending on the encryption algorithm used, but is typically 2&amp;lt;sup&amp;gt;35&amp;lt;/sup&amp;gt; bytes (~34 gigabytes) for 64 bit block ciphers (DES, 3DES, Blowfish, RC5, ...) and 2&amp;lt;sup&amp;gt;68&amp;lt;/sup&amp;gt; bytes (~ 295,147,905 terabytes) for 128 bit block ciphers (AES, TwoFish, Serpent).  If encrypting with a modern cipher, this threshold is unlikely to be reached, but it should be considered when evaluating algorithms and rotation procedures.&lt;br /&gt;
&lt;br /&gt;
=== Rule - Follow applicable regulations on use of cryptography ===&lt;br /&gt;
&lt;br /&gt;
==== Rule - Under PCI DSS requirement 3, you must protect cardholder data  ====&lt;br /&gt;
&lt;br /&gt;
The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. The standard was introduced in 2005 and replaced individual compliance standards from Visa, Mastercard, Amex, JCB and Diners. The current version of the standard is 3.1 and was published in April, 2015. &lt;br /&gt;
&lt;br /&gt;
PCI DSS requirement 3 covers secure storage of credit card data. This requirement covers several aspects of secure storage including the data you must never store but we are covering Cryptographic Storage which is covered in requirements 3.4, 3.5 and 3.6 as you can see below: &lt;br /&gt;
&lt;br /&gt;
'''3.4 Render PAN (Primary Account Number), at minimum, unreadable anywhere it is stored''' &lt;br /&gt;
&lt;br /&gt;
Compliance with requirement 3.4 can be met by implementing any of the four types of secure storage described in the standard which includes encrypting and hashing data. These two approaches will often be the most popular choices from the list of options. The standard doesn't refer to any specific algorithms but it mandates the use of '''Strong Cryptography'''. The glossary document from the PCI council defines '''Strong Cryptography''' as: &lt;br /&gt;
&lt;br /&gt;
''Cryptography based on industry-tested and accepted algorithms, along with strong key lengths and proper key-management practices. Cryptography is a method to protect data and includes both encryption (which is reversible) and hashing (which is not reversible, or “one way”). SHA-1 is an example of an industry-tested and accepted hashing algorithm. Examples of industry-tested and accepted standards and algorithms for encryption include AES (128 bits and higher), TDES (minimum double-length keys), RSA (1024 bits and higher), ECC (160 bits and higher), and ElGamal (1024 bits and higher).'' &lt;br /&gt;
&lt;br /&gt;
If you have implemented the second rule in this cheat sheet you will have implemented a strong cryptographic algorithm which is compliant with or stronger than the requirements of PCI DSS requirement 3.4. You need to ensure that you identify all locations that card data could be stored including logs and apply the appropriate level of protection. This could range from encrypting the data to replacing the card number in logs. &lt;br /&gt;
&lt;br /&gt;
This requirement can also be met by implementing disk encryption rather than file or column level encryption. The requirements for '''Strong Cryptography''' are the same for disk encryption and backup media. The card data should never be stored in the clear and by following the guidance in this cheat sheet you will be able to securely store your data in a manner which is compliant with PCI DSS requirement 3.4 &lt;br /&gt;
&lt;br /&gt;
'''3.5  Protect any keys used to secure cardholder data against disclosure and misuse''' &lt;br /&gt;
&lt;br /&gt;
As the requirement name above indicates, we are required to securely store the encryption keys themselves. This will mean implementing strong access control, auditing and logging for your keys. The keys must be stored in a location which is both secure and &amp;quot;away&amp;quot; from the encrypted data. This means key data shouldn't be stored on web servers, database servers etc &lt;br /&gt;
&lt;br /&gt;
Access to the keys must be restricted to the smallest amount of users possible. This group of users will ideally be users who are highly trusted and trained to perform Key Custodian duties. There will obviously be a requirement for system/service accounts to access the key data to perform encryption/decryption of data. &lt;br /&gt;
&lt;br /&gt;
The keys themselves shouldn't be stored in the clear but encrypted with a KEK (Key Encrypting Key). The KEK must not be stored in the same location as the encryption keys it is encrypting. &lt;br /&gt;
&lt;br /&gt;
'''3.6 Fully document and implement all key-management processes and procedures for cryptographic keys used for encryption of cardholder data''' &lt;br /&gt;
&lt;br /&gt;
Requirement 3.6 mandates that key management processes within a PCI compliant company cover 8 specific key lifecycle steps: &lt;br /&gt;
&lt;br /&gt;
'''3.6.1 Generation of strong cryptographic keys''' &lt;br /&gt;
&lt;br /&gt;
As we have previously described in this cheat sheet we need to use algorithms which offer high levels of data security. We must also generate strong keys so that the security of the data isn't undermined by weak cryptographic keys. A strong key is generated by using a key length which is sufficient for your data security requirements and compliant with the PCI DSS. The key size alone isn't a measure of the strength of a key. The data used to generate the key must be sufficiently random (&amp;quot;sufficient&amp;quot; often being determined by your data security requirements) and the entropy of the key data itself must be high.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''3.6.2 Secure cryptographic key distribution''' &lt;br /&gt;
&lt;br /&gt;
The method used to distribute keys must be secure to prevent the theft of keys in transit. The use of a protocol such as Diffie Hellman can help secure the distribution of keys, the use of secure transport such as TLS and SSHv2 can also secure the keys in transit. Older protocols like SSLv3 should not be used.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''3.6.3 Secure cryptographic key storage'''&lt;br /&gt;
&lt;br /&gt;
The secure storage of encryption keys including KEK's has been touched on in our description of requirement 3.5 (see above).&lt;br /&gt;
&lt;br /&gt;
'''3.6.4 Periodic cryptographic key changes'''&lt;br /&gt;
&lt;br /&gt;
The PCI DSS standard mandates that keys used for encryption must be rotated at least annually. The key rotation process must remove an old key from the encryption/decryption process and replace it with a new key. All new data entering the system must encrypted with the new key. While it is recommended that existing data be rekeyed with the new key, as per the Rekey data at least every one to three years rule above, it is not clear that the PCI DSS requires this.&lt;br /&gt;
&lt;br /&gt;
'''3.6.5 Retirement or replacement of keys as deemed necessary when the integrity of the key has been weakened or keys are suspected of being compromised'''&lt;br /&gt;
&lt;br /&gt;
The key management processes must cater for archived, retired or compromised keys. The process of securely storing and replacing these keys will more than likely be covered by your processes for requirements 3.6.2, 3.6.3 and 3.6.4&lt;br /&gt;
&lt;br /&gt;
'''3.6.6 Split knowledge and establishment of dual control of cryptographic keys'''&lt;br /&gt;
&lt;br /&gt;
The requirement for split knowledge and/or dual control for key management prevents an individual user performing key management tasks such as key rotation or deletion. The system should require two individual users to perform an action (i.e. entering a value from their own OTP) which creates to separate values which are concatenated to create the final key data.&lt;br /&gt;
&lt;br /&gt;
'''3.6.7 Prevention of unauthorized substitution of cryptographic keys'''&lt;br /&gt;
&lt;br /&gt;
The system put in place to comply with requirement 3.6.6 can go a long way to preventing unauthorised substitution of key data. In addition to the dual control process you should implement strong access control, auditing and logging for key data so that unauthorised access attempts are prevented and logged.&lt;br /&gt;
&lt;br /&gt;
'''3.6.8 Requirement for cryptographic key custodians to sign a form stating that they understand and accept their key-custodian responsibilities '''&lt;br /&gt;
&lt;br /&gt;
To perform the strong key management functions we have seen in requirement 3.6 we must have highly trusted and trained key custodians who understand how to perform key management duties. The key custodians must also sign a form stating they understand the responsibilities that come with this role.&lt;br /&gt;
&lt;br /&gt;
= Related Articles  =&lt;br /&gt;
&lt;br /&gt;
OWASP - [[Testing for SSL-TLS (OWASP-CM-001)|Testing for SSL-TLS]], and OWASP [[Guide to Cryptography]] &lt;br /&gt;
&lt;br /&gt;
OWASP – [http://www.owasp.org/index.php/ASVS Application Security Verification Standard (ASVS) – Communication Security Verification Requirements (V10)]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Kevin Kenan - kevin[at]k2dd.com&amp;lt;br/&amp;gt;&lt;br /&gt;
David Rook - david.a.rook[at]gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Kevin Wall - kevin.w.wall[at]gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Fred Donovan - fred.donovan(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Password_Storage_Cheat_Sheet&amp;diff=220828</id>
		<title>Password Storage Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Password_Storage_Cheat_Sheet&amp;diff=220828"/>
				<updated>2016-08-29T01:22:35Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: changed recommended salt size from '32bit' to '32 byte'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
Media covers the theft of large collections of passwords on an almost daily basis. Media coverage of password theft discloses the password storage scheme, the weakness of that scheme, and often discloses a large population of compromised credentials that can affect multiple web sites or other applications. This article provides guidance on properly storing passwords, secret question responses, and similar credential information. Proper storage helps prevent theft, compromise, and malicious use of credentials.&lt;br /&gt;
Information systems store passwords and other credentials in a variety of protected forms. Common vulnerabilities allow the theft of protected passwords through attack vectors such as SQL Injection. Protected passwords can also be stolen from artifacts such as logs, dumps, and backups.&lt;br /&gt;
&lt;br /&gt;
Specific guidance herein protects against stored credential theft but the bulk of guidance aims to prevent credential compromise. That is, this guidance helps designs resist revealing users’ credentials or allowing system access in the event threats steal protected credential information. For more information and a thorough treatment of this topic, refer to the Secure Password Storage Threat Model here [http://goo.gl/Spvzs http://goo.gl/Spvzs].&lt;br /&gt;
&lt;br /&gt;
= Guidance =&lt;br /&gt;
&lt;br /&gt;
==  Do not limit the character set and set long max lengths for credentials ==&lt;br /&gt;
&lt;br /&gt;
Some organizations restrict the 1) types of special characters and 2) length of credentials accepted by systems because of their inability to prevent SQL Injection, Cross-site scripting, command-injection and other forms of injection attacks. These restrictions, while well-intentioned, facilitate certain simple attacks such as brute force.&lt;br /&gt;
&lt;br /&gt;
Do not allow short or no-length passwords and do not apply character set, or encoding restrictions on the entry or storage of credentials. Continue applying encoding, escaping, masking, outright omission, and other best practices to eliminate injection risks.&lt;br /&gt;
&lt;br /&gt;
A reasonable long password length is 160. Very long password policies can lead to DOS in certain circumstances[http://arstechnica.com/security/2013/09/long-passwords-are-good-but-too-much-length-can-be-bad-for-security/].&lt;br /&gt;
&lt;br /&gt;
== Use a cryptographically strong credential-specific salt ==&lt;br /&gt;
&lt;br /&gt;
A salt is fixed-length cryptographically-strong random value. Append credential data to the salt and use this as input to a protective function. Store the protected form appended to the salt as follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;[protected form] = [salt] + protect([protection func], [salt] + [credential]);&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Follow these practices to properly implement credential-specific salts:&lt;br /&gt;
&lt;br /&gt;
* Generate a unique salt upon creation of each stored credential (not just per user or system wide);&lt;br /&gt;
* Use cryptographically-strong random [*3] data;&lt;br /&gt;
* As storage permits, use a 32 byte or 64 byte salt (actual size dependent on protection function);&lt;br /&gt;
* Scheme security does not depend on hiding, splitting, or otherwise obscuring the salt.&lt;br /&gt;
&lt;br /&gt;
Salts serve two purposes: 1) prevent the protected form from revealing two identical credentials and 2) augment entropy fed to protecting function without relying on credential complexity. The second aims to make pre-computed lookup attacks [*2] on an individual credential and time-based attacks on a population intractable.&lt;br /&gt;
&lt;br /&gt;
== Impose infeasible verification on attacker ==&lt;br /&gt;
&lt;br /&gt;
The function used to protect stored credentials should balance attacker and defender verification. The defender needs an acceptable response time for verification of users’ credentials during peak use. However, the time required to map &amp;lt;code&amp;gt;&amp;lt;credential&amp;gt; → &amp;lt;protected form&amp;gt;&amp;lt;/code&amp;gt;  must remain beyond threats’ hardware (GPU, FPGA) and technique (dictionary-based, brute force, etc) capabilities.&lt;br /&gt;
&lt;br /&gt;
Two approaches facilitate this, each imperfectly.&lt;br /&gt;
&lt;br /&gt;
=== Leverage an adaptive one-way function ===&lt;br /&gt;
&lt;br /&gt;
Adaptive one-way functions compute a one-way (irreversible) transform. Each function allows configuration of ‘work factor’. Underlying mechanisms used to achieve irreversibility and govern work factors (such as time, space, and parallelism) vary between functions and remain unimportant to this discussion. &lt;br /&gt;
&lt;br /&gt;
Select:&lt;br /&gt;
&lt;br /&gt;
* Argon2[*7] when it becomes available. Argon2 is the winner of the [https://password-hashing.net/ password hashing competition] and should be considered as your first choice when solid implementations are available. &lt;br /&gt;
* PBKDF2 [*4] when FIPS certification or enterprise support on many platforms is required;&lt;br /&gt;
* scrypt [*5] where resisting any/all hardware accelerated attacks is necessary but support isn’t.&lt;br /&gt;
* bcrypt where PBKDF2 or scrypt support is not available.&lt;br /&gt;
&lt;br /&gt;
Example protect() pseudo-code follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;return [salt] + pbkdf2([salt], [credential], c=10000); &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Designers select one-way adaptive functions to implement protect() because these functions can be configured to cost (linearly or exponentially) more than a hash function to execute. Defenders adjust work factor to keep pace with threats’ increasing hardware capabilities. Those implementing adaptive one-way functions must tune work factors so as to impede attackers while providing acceptable user experience and scale. &lt;br /&gt;
&lt;br /&gt;
Additionally, adaptive one-way functions do not effectively prevent reversal of common dictionary-based credentials (users with password ‘password’) regardless of user population size or salt usage.&lt;br /&gt;
&lt;br /&gt;
==== Work Factor ====&lt;br /&gt;
&lt;br /&gt;
Since resources are normally considered limited, a common rule of thumb for tuning the work factor (or cost) is to make protect() run as slow as possible without affecting the users' experience and without increasing the need for extra hardware over budget. So, if the registration and authentication's cases accept protect() taking up to 1 second, you can tune the cost so that it takes 1 second to run on your hardware. This way, it shouldn't be so slow that your users become affected, but it should also affect the attackers' attempt as much as possible. &lt;br /&gt;
&lt;br /&gt;
While there is a minimum number of iterations recommended to ensure data safety, this value changes every year as technology improves. An example of the iteration count chosen by a well known company is the 10,000 iterations Apple uses for its iTunes passwords (using PBKDF2)[http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf](PDF file). However, it is critical to understand that a single work factor does not fit all designs. Experimentation is important.[*6]&lt;br /&gt;
&lt;br /&gt;
=== Leverage Keyed functions ===&lt;br /&gt;
&lt;br /&gt;
Keyed functions, such as HMACs, compute a one-way (irreversible) transform using a private key and given input. For example, HMACs inherit properties of hash functions including their speed, allowing for near instant verification. Key size imposes infeasible size- and/or space- requirements on compromise--even for common credentials (aka password = ‘password’).&lt;br /&gt;
Designers protecting stored credentials with keyed functions:&lt;br /&gt;
&lt;br /&gt;
* Use a single “site-wide” key;&lt;br /&gt;
* Protect this key as any private key using best practices;&lt;br /&gt;
* Store the key outside the credential store (aka: not in the database);&lt;br /&gt;
* Generate the key using cryptographically-strong pseudo-random data;&lt;br /&gt;
* Do not worry about output block size (i.e. SHA-256 vs. SHA-512).&lt;br /&gt;
&lt;br /&gt;
Example protect() pseudo-code follows:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;return [salt] + HMAC-SHA-256([key], [salt] + [credential]);  &amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Upholding security improvement over (solely) salted schemes relies on proper key management.&lt;br /&gt;
&lt;br /&gt;
== Design password storage assuming eventual compromise ==&lt;br /&gt;
&lt;br /&gt;
The frequency and ease with which threats steal protected credentials demands “design for failure”. Having detected theft, a credential storage scheme must support continued operation by marking credential data as compromised. It's also critical to engage alternative credential validation workflows as follows:&lt;br /&gt;
&lt;br /&gt;
# Protect the user’s account&lt;br /&gt;
## Invalidate authentication ‘shortcuts’ by disallowing login without 2nd factors, secret questions or some other form os strong authentication.&lt;br /&gt;
## Disallow changes to user accounts such as editing secret questions and changing account multi-factor configuration settings.&lt;br /&gt;
# Load and use new protection scheme&lt;br /&gt;
## Load a new, stronger credential protection scheme&lt;br /&gt;
## Include version information stored with form&lt;br /&gt;
## Set ‘tainted’/‘compromised’ bit until user resets credentials&lt;br /&gt;
## Rotate any keys and/or adjust protection function parameters such as work factor or salt&lt;br /&gt;
## Increment scheme version number&lt;br /&gt;
# When user logs in:&lt;br /&gt;
## Validate credentials based on stored version (old or new); if older compromised version is still active for user, demand 2nd factor or secret answers until the new method is implemented or activated for that user&lt;br /&gt;
## Prompt user for credential change, apologize, &amp;amp; conduct out-of-band confirmation&lt;br /&gt;
## Convert stored credentials to new scheme as user successfully log in&lt;br /&gt;
&lt;br /&gt;
= References=&lt;br /&gt;
&lt;br /&gt;
* [1] Morris, R. Thompson, K., Password Security: A Case History, 04/03/1978, p4: http://cm.bell-labs.com/cm/cs/who/dmr/passwd.ps&lt;br /&gt;
* [2] Space-based (Lookup) attacks: Space-time Tradeoff: Hellman, M., Crypanalytic Time-Memory Trade-Off, Transactions of Information Theory, Vol. IT-26, No. 4, July, 1980 http://www-ee.stanford.edu/~hellman/publications/36.pdf Rainbow Tables -http://ophcrack.sourceforge.net/tables.php&lt;br /&gt;
* [3] For example: [http://docs.oracle.com/javase/6/docs/api/java/security/SecureRandom.html SecureRandom.html].&lt;br /&gt;
* [4] Kalski, B., PKCS #5: Password-Based Cryptography Specification Version 2.0, IETF RFC 2898, September, 2000, p9 http://www.ietf.org/rfc/rfc2898.txt&lt;br /&gt;
* [5] Percival, C., Stronger Key Derivation Via Sequential Memory-Hard Functions, BSDCan ‘09, May, 2009 http://www.tarsnap.com/scrypt/scrypt.pdf&lt;br /&gt;
* [6] For instance, one might set work factors targeting the following run times: (1) Password-generated session key - fraction of a second; (2) User credential - ~0.5 seconds; (3) Password-generated site (or other long-lived) key - potentially a second or more.&lt;br /&gt;
* [7] Argon2 detailed specifications can be found here. https://password-hashing.net/argon2-specs.pdf&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
John Steven - john.steven[at]owasp.org (author)&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org (editor)&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013-Top_10&amp;diff=150089</id>
		<title>Top 10 2013-Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013-Top_10&amp;diff=150089"/>
				<updated>2013-04-18T16:53:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: URL for A5 was mapped to A6, fixed it.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next={{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2013}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=Risk&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%;&amp;quot;&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=1}}&amp;lt;br/&amp;gt;A1-Injection&lt;br /&gt;
    {{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=2}}A2–Broken Authentication and Session Management&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or  exploit other implementation flaws to assume other users’ identities.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=3}}&amp;lt;br/&amp;gt;A3–Cross-Site Scripting (XSS)&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=4}}&amp;lt;br/&amp;gt;A4–Insecure Direct Object References&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=5}}&amp;lt;br/&amp;gt;A5–Security Misconfiguration&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=6}}&amp;lt;br/&amp;gt;A6–Sensitive Data Exposure&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Many web applications do not properly protect sensitive data, such as credit cards, tax ids, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct identity theft, credit card fraud, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=7}}A7–Missing Function Level Access Control &lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Virtually all web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access unauthorized functionality.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=8}}A8-Cross-Site Request Forgery (CSRF)&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=9}}A9-Using Components with Known Vulnerabilities&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Vulnerable components, such as libraries, frameworks, and other software modules almost always run with full privilege. So, if exploited, they can cause serious data loss or server takeover. Applications using these vulnerable components may undermine their defenses and enable a range of possible attacks and impacts.&lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Top 10:RoundedBoxLinkBegin|year=2013|risk=10}}A10–Unvalidated Redirects and Forwards&lt;br /&gt;
{{Top 10:RoundedBoxLinkEnd|year=2013}}&lt;br /&gt;
|{{Top 10:GrayBoxBegin|year=2013}}&lt;br /&gt;
Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages. &lt;br /&gt;
{{Top 10:GrayBoxEnd|year=2013}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next={{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2013}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=Risk&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63714</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63714"/>
				<updated>2009-06-07T15:33:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 5 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : Not Decided&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part II)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| 07 June 2009&lt;br /&gt;
| ICH, Church Street&lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Jun 2009===&lt;br /&gt;
'''Topic''': Turning Firefox Into Ultimate Hacking Tool(SecFox) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63713</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63713"/>
				<updated>2009-06-07T15:32:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 5 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : India Coffee House, Church Street&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part II)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| 07 June 2009&lt;br /&gt;
| ICH, Church Street&lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Jun 2009===&lt;br /&gt;
'''Topic''': Turning Firefox Into Ultimate Hacking Tool(SecFox) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63712</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63712"/>
				<updated>2009-06-07T15:32:22Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* 02 Feb 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 7 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : India Coffee House, Church Street&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part I)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| 07 June 2009&lt;br /&gt;
| ICH, Church Street&lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Jun 2009===&lt;br /&gt;
'''Topic''': Turning Firefox Into Ultimate Hacking Tool(SecFox) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63711</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63711"/>
				<updated>2009-06-07T15:26:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Meeting Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 7 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : India Coffee House, Church Street&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part I)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| 07 June 2009&lt;br /&gt;
| ICH, Church Street&lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Jun 2009===&lt;br /&gt;
'''Topic''': Turning Firefox Into Ultimate Hacking Tool(SecFox) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Talk on tweaking Firefox with various addons and doing some customizations so that it can be used to perform vulnerability assessments on various websites.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63688</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63688"/>
				<updated>2009-06-06T01:44:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 7 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : India Coffee House, Church Street&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part I)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| 07 June 2009&lt;br /&gt;
| ICH, Church Street&lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63687</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63687"/>
				<updated>2009-06-06T01:43:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Meeting Venue and Dates */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 7 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : India Coffee House, Church Street&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part I)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| 06 June 2009&lt;br /&gt;
| ICH, Church Street&lt;br /&gt;
| 09.00 AM&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63686</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=63686"/>
				<updated>2009-06-06T01:42:44Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 7 June 2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 09.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : India Coffee House, Church Street&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Rajiv Vishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Turn Firefox into SecFox (Part I)&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=60352</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=60352"/>
				<updated>2009-05-08T10:30:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting */  6-Jun-09&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 6-Jun-2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 10.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : Not Decided Yet&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Praveen &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : IFrame Injection &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''''Note:''' Then meeting for 9-May-09 stays canceled due to some unexpected logistical issues.''&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=57015</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=57015"/>
				<updated>2009-03-19T16:27:10Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: Added April Meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 11-Apr-2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 10.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : ThoughtWorks Bangalore([http://www.devcamp.in/wiki/Main_Page Part of DevCamp8])&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Jayesh Mantra &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Securing PHP Applications &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| 11 April 2009&lt;br /&gt;
| ThoughtWorks Bangalore, ([http://www.devcamp.in/wiki/Main_Page DevCamp2])&lt;br /&gt;
| 10.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=57014</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=57014"/>
				<updated>2009-03-19T16:25:00Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: Changed the date and time&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 11-Apr-2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 10.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : ThoughtWorks Bangalore([http://www.devcamp.in/wiki/Main_Page Part of DevCamp8])&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Jayesh Mantra &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Securing PHP Applications &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=57013</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=57013"/>
				<updated>2009-03-19T16:24:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: Edited the venue, link to DevCamp&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 5-Apr-2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 9.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : ThoughtWorks Bangalore([http://www.devcamp.in/wiki/Main_Page Part of DevCamp8])&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Jayesh Mantra &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Securing PHP Applications &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56806</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56806"/>
				<updated>2009-03-17T02:46:38Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 5-Apr-2009 &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Time'''  : 9.00 AM &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Venue''' : Indian Coffee House, MG Road(Near Deccan Herald)&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presenter''' : Jayesh Mantra &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Agenda''' : Securing PHP Applications &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56805</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56805"/>
				<updated>2009-03-17T02:45:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Next Meeting==&lt;br /&gt;
&lt;br /&gt;
'''Date'''  : 5-Apr-2009&lt;br /&gt;
&lt;br /&gt;
'''Time'''  : 9.00 AM&lt;br /&gt;
&lt;br /&gt;
'''Venue''' : Indian Coffee House, MG Road(Near Deccan Herald)&lt;br /&gt;
&lt;br /&gt;
'''Presenter''' : Jayesh Mantra&lt;br /&gt;
&lt;br /&gt;
'''Agenda''' : Securing PHP Applications&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56804</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56804"/>
				<updated>2009-03-17T02:43:57Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting '''==&lt;br /&gt;
&lt;br /&gt;
Date  : 5-Apr-2009&lt;br /&gt;
Time  : 9.00 AM&lt;br /&gt;
Venue : Indian Coffee House,MG Road (Near Deccan Herald)&lt;br /&gt;
Presenter : Jayesh Mantra&lt;br /&gt;
Agenda: Securing PHP Applications&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56494</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56494"/>
				<updated>2009-03-11T10:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* Next Meeting  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting '''==&lt;br /&gt;
&lt;br /&gt;
Date  : NA&lt;br /&gt;
&lt;br /&gt;
Time  : NA&lt;br /&gt;
&lt;br /&gt;
Venue : NA&lt;br /&gt;
&lt;br /&gt;
Agenda: NA&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56493</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56493"/>
				<updated>2009-03-11T10:06:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: /* OWASP Bangalore Chapter Meetings  */  format table&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting '''==&lt;br /&gt;
&lt;br /&gt;
Date  : '''7 March 2009'''&lt;br /&gt;
&lt;br /&gt;
Time  :  Available slot (Will announce on the mailing list))&lt;br /&gt;
&lt;br /&gt;
Venue : BarCamp Bangalore 8, Yahoo India Center, Bangalore&lt;br /&gt;
&lt;br /&gt;
Agenda: Introduction to OWASP for new members, Presentation by Sharmishtha Gupta&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Venue and Dates'''== &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! No&lt;br /&gt;
! Date&lt;br /&gt;
! Venue&lt;br /&gt;
! Time&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| 07 March 2009&lt;br /&gt;
| Yahoo, Embassy Golf Links Business Park&lt;br /&gt;
| 11.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| 02 February 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| 11 January 2009&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| 14 December 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| 16 November 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.00 AM&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| 13 September 2008&lt;br /&gt;
| IIM Bangalore (Part of BarCamp Bangalore-7)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| 09 August 2008&lt;br /&gt;
| Microland Office&lt;br /&gt;
| 3.00 PM&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| 12 July 2008&lt;br /&gt;
| RSA Office (Part of Secure Camp)&lt;br /&gt;
| 9.30 AM&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| 29 June 2008&lt;br /&gt;
| India Coffee House, MG Road&lt;br /&gt;
| 9.30AM&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 28 June 2007&lt;br /&gt;
| (Part of Barcamp Bangalore-4)&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2006&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56492</id>
		<title>Bangalore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bangalore&amp;diff=56492"/>
				<updated>2009-03-11T09:44:29Z</updated>
		
		<summary type="html">&lt;p&gt;Rajivvishwa: Formatted the page and added meeting notes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bangalore|extra=The chapter leader is [mailto:hpudipeddi@owasp.org Harinath Pudipeddi]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bangalore|emailarchives=http://lists.owasp.org/pipermail/owasp-bangalore}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bangalore&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Next Meeting '''==&lt;br /&gt;
&lt;br /&gt;
Date  : '''7 March 2009'''&lt;br /&gt;
&lt;br /&gt;
Time  :  Available slot (Will announce on the mailing list))&lt;br /&gt;
&lt;br /&gt;
Venue : BarCamp Bangalore 8, Yahoo India Center, Bangalore&lt;br /&gt;
&lt;br /&gt;
Agenda: Introduction to OWASP for new members, Presentation by Sharmishtha Gupta&lt;br /&gt;
&lt;br /&gt;
== '''OWASP Bangalore Chapter Meetings '''== &lt;br /&gt;
&lt;br /&gt;
1st Meeting - 2006&lt;br /&gt;
&lt;br /&gt;
2nd Meeting - 2006&lt;br /&gt;
&lt;br /&gt;
3rd Meeting - July 28/29, 2007 at BarCamp Bangalore 4&lt;br /&gt;
&lt;br /&gt;
4th Meeting - 29 June 2008, India Coffee House @ 9:30 AM&lt;br /&gt;
&lt;br /&gt;
5th Meeting - 12 July 2008, Security Camp, RSA Office, Bangalore @ 9:30 AM&lt;br /&gt;
&lt;br /&gt;
7th Meeting - 09 August 2008, Microland Office @ 3:00 PM&lt;br /&gt;
&lt;br /&gt;
8th Meeting - 13 September 2008, IIM Bangalore. This meeting will be part of BarCamp Bangalore 7. Please visit http://barcampbangalore.org for more information.&lt;br /&gt;
&lt;br /&gt;
9th Meeting - 16 November 2008, India Coffee House @9 AM, MG Road, Bangalore - 01&lt;br /&gt;
&lt;br /&gt;
10th Meeting - 14 December 2008, India Coffee House @9 AM, MG Road, Beside Deccan Herald Office, Bangalore - 01&lt;br /&gt;
&lt;br /&gt;
11th Meeting - 11 January 2009, India Coffee House @9 AM, MG Road, Beside Deccan Herald Office, Bangalore - 01&lt;br /&gt;
&lt;br /&gt;
12th Meeting - 02 February 2009, India Coffee House @9 AM, MG Road, Beside Deccan Herald Office, Bangalore - 01&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:India]]&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Summary'''== &lt;br /&gt;
&lt;br /&gt;
===07 Mar 2009===&lt;br /&gt;
'''Topic''': Hackers Secret&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': Sharmishta Gupta&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''': &lt;br /&gt;
Headsup on OWASP top vulnerabilities and introduction to Webgoat application.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===02 Feb 2009===&lt;br /&gt;
'''Attendees''': 13 Members&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Topic''': Cracking applications with OllyDbg debugger(Demo) &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''': RajivVishwa&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Session on debugging standalone executables to pin point security holes which is otherwise exploited by crackers to patch the pro version to freeware. Couple of tiny applications which requires keys for activation are cracked during the session.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===14 Dec 2008===&lt;br /&gt;
'''Topic''': Access Control Mechanisms &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Author''' : Sundar&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Description''':&lt;br /&gt;
Overview on different types of access control schemes and its usages.&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Comments''':&lt;br /&gt;
The main agenda for the meet has been a presentation on &amp;quot;Access Controls&amp;quot; by Sundar. It was informative and lead to a good discussion on the topic. The meet lasted for over an hour and has seen good acceptance by members who attended.&lt;br /&gt;
&lt;br /&gt;
==Stay Tuned==&lt;br /&gt;
'''Subscribe to Mailing list''' - https://lists.owasp.org/mailman/listinfo/owasp-bangalore&lt;br /&gt;
&lt;br /&gt;
'''Receive SMS Alerts''' - http://labs.google.co.in/smschannels/subscribe/OwaspBangalore&lt;/div&gt;</summary>
		<author><name>Rajivvishwa</name></author>	</entry>

	</feed>