<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rdurkee</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rdurkee"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Rdurkee"/>
		<updated>2026-05-02T18:46:35Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=248759</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=248759"/>
				<updated>2019-03-13T17:11:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Last Year's Events */  removed mailto link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Rochester_banner.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leaders are:&lt;br /&gt;
* [mailto:ralph.durkee@owasp.org Ralph Durkee]&lt;br /&gt;
* [mailto:john.king@owasp.org John King]&lt;br /&gt;
* [mailto:jim.keeler@owasp.org James Keeler]&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.&lt;br /&gt;
&lt;br /&gt;
== Connect With Us ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/pipermail/owasp-rochester-ny]]&lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasprochester]]&lt;br /&gt;
| [[Image:meetup-button.png|108px|link=https://www.meetup.com/OWASP-Rochester-Chapter]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Rochester-Chapter&amp;quot; /&amp;gt;&lt;br /&gt;
=== Archived events ===&lt;br /&gt;
[[Rochester_Meeting_Archive|Visit our archive page for all old event details.]]&lt;br /&gt;
&lt;br /&gt;
=== Last Year's Events ===&lt;br /&gt;
'''OWASP December 19th Meeting'''&lt;br /&gt;
&lt;br /&gt;
You are invited to join the Rochester OWASP chapter and the ISSA Rochester chapter for our joint December 19&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; Meeting at 6pm. Space is limited, so please RSVP by Dec 12&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; so we can plan accordingly. Dinosaur BBQ will be provided! Come and hear a great presentation, and network with your fellow professionals.&lt;br /&gt;
&lt;br /&gt;
The OWASP chapter is covering its portion of the costs for the event, so if you are a paid OWASP member, Thank you! If not, please consider signing up today.&lt;br /&gt;
&lt;br /&gt;
Our own illustrious '''Jim Keeler''' will presenting:&lt;br /&gt;
&lt;br /&gt;
'''Title''': Introduction to Threat Modeling&lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Every business has something to protect. Has yours modeled all of the ways it could be attacked? How will you defend your assets if attacked? How will you account for changes in the threat landscape? We will explore all of these questions and discuss a repeatable process for reducing risk.&lt;br /&gt;
&lt;br /&gt;
'''Bio''': Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.&lt;br /&gt;
&lt;br /&gt;
'''Where''': Nixon Peabody, 1300 Clinton Square, 14th floor [CORRECTED] (free parking underneath the building, bring the ticket to the meeting for validation)&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday, Dec 19th, 6:00 PM&lt;br /&gt;
&lt;br /&gt;
Please RSVP by Dec 12&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; to Ralph Durkee&lt;br /&gt;
&lt;br /&gt;
Thank you, Hope to see you there!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;;Rochester Security Summit 2018&lt;br /&gt;
Date: Oct 9 &amp;amp; 10, 2018  OWASP AppSec Track:&lt;br /&gt;
* What is the Android Colluded Applications Attack and How to Detect It (Igor Khokhlov &amp;amp; Leon Reznik)&lt;br /&gt;
* Pentesting DevOps: Attacking Containers and Container Orchestration (Mark Manning)&lt;br /&gt;
* Rocking The (Vox)Vote (Jason Ross)&lt;br /&gt;
* Your Apps Have Gone Serverless. Has Your Security? (Tal Melamed)&lt;br /&gt;
* Techniques Criminals Use to Break Authentication and How to Defend Against These Attacks (Danny Harris)&lt;br /&gt;
* The Industrialization of Red and Blue Teaming (Ashley Zaya)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; '''OWASP Juice Shop Workshop'''&lt;br /&gt;
; '''July 18th, 2018'''&lt;br /&gt;
; '''5:30 pm - 8:00 pm'''&lt;br /&gt;
; '''44 Celebration Drive, Conference Rooms 2007a and 2007b'''&lt;br /&gt;
&lt;br /&gt;
We're looking for chapter members who are familiar with basic application security and the OWASP Top 10 who are interested in learning OWASP Juice Shop.  The goal is to help plan and facilitate a larger capture-the-flag event at a future meeting.  Please bring a Laptop with a WiFi network connection and a modern web browser.  You will be installing OWASP Juice Shop on your laptop.&lt;br /&gt;
&lt;br /&gt;
; '''What is OWASP Juice Shop?'''&lt;br /&gt;
&lt;br /&gt;
OWASP Juice Shop is an intentionally insecure web app for security trainings written entirely in JavaScript which encompasses the entire OWASP Top Ten and other severe security flaws.  Juice Shop is written in Node.js, Express and AngularJS.  https://www.owasp.org/index.php/OWASP_Juice_Shop_Project&lt;br /&gt;
&lt;br /&gt;
; '''What will the workshop cover?'''&lt;br /&gt;
&lt;br /&gt;
Jim Keeler will lead the workshop. Attendees will learn about the OWASP Juice Shop project, installation and setup, how to exploit common web application vulnerabilities, jeopardy style capture-the-flag (CTF) events, and CTF scoreboards. At the end of the workshop we will be looking for volunteers to help us host a future CTF event!   Pizza will be provided.  '''Please RSVP to Ralph Durkee, &amp;lt;Ralph.Durkee@owasp.org&amp;gt; so that we may expect you.'''&lt;br /&gt;
&lt;br /&gt;
; '''Directions'''&lt;br /&gt;
&lt;br /&gt;
[[File:UofRMC Map.png|thumb]]&lt;br /&gt;
Park anywhere in the green area. You can enter from Elmwood Ave going eastbound only or from Celebration Drive. Parking is free in the labeled surface lot. Enter the building by the arrow. Take the stairs or elevator to the 2nd floor. Take a right off the elevator and you should be able to easily find room 2007.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; '''OWASP Rochester Social Event'''&lt;br /&gt;
Please join the Rochester OWASP chapter for a social event Wednesday, April 25th at MacGregors' in Henrietta.&lt;br /&gt;
&lt;br /&gt;
Appetizers will be provided.&lt;br /&gt;
&lt;br /&gt;
'''When: Wednesday, April 25 at 5:30pm'''&lt;br /&gt;
&lt;br /&gt;
'''Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)'''&lt;br /&gt;
&lt;br /&gt;
; '''OWASP Rochester Social Event'''&lt;br /&gt;
Please join the Rochester OWASP chapter for a social event Wednesday, December 6th at MacGregors' in Henrietta.&lt;br /&gt;
&lt;br /&gt;
Appetizers will be provided.&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, December 6 at 5:30pm&lt;br /&gt;
&lt;br /&gt;
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. &lt;br /&gt;
&lt;br /&gt;
'''Mailing Lists:'''&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce Announcements]&lt;br /&gt;
* [http://lists.owasp.org/pipermail/owasp-rochester-ny Discussion] &lt;br /&gt;
Prior to participating with OWASP please review the [[:Category:Chapter Handbook|Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Date&lt;br /&gt;
!Title&lt;br /&gt;
!Presenter&lt;br /&gt;
!Download&lt;br /&gt;
|-&lt;br /&gt;
|2012, May&lt;br /&gt;
''Mercury Networks Security Symposium''&lt;br /&gt;
|I'll see your cross site scripting and raise you a Content Security Policy&lt;br /&gt;
|Lou Leone&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://www.owasp.org/images/9/95/2012_CSP.pptx]]&lt;br /&gt;
|-&lt;br /&gt;
|2011, January&lt;br /&gt;
|State of OWASP and the State of Web Application Security by Ralph Durkee&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:Ralph Durkee State of Web App Security v8.pdf‎]]&lt;br /&gt;
|-&lt;br /&gt;
|2010, August&lt;br /&gt;
|Man in the Middle Attacks: SSL Spoofing&lt;br /&gt;
|Duane Peifer&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:SSL_Spoofing.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:SSL Spoofing.pdf‎]]&lt;br /&gt;
|-&lt;br /&gt;
|2010, August&lt;br /&gt;
|Man in the Middle Attacks: SSL Spoofing&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Ralph_Durkee_SSL_MITM_v1.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:Ralph Durkee SSL MITM v1.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
|2010, May&lt;br /&gt;
|New Techniques in Application Intrusion Detection&lt;br /&gt;
|Al Huizenga&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP may17-10.pptx‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:OWASP may17-10.pdf‎]]&lt;br /&gt;
|-&lt;br /&gt;
|2010, May&lt;br /&gt;
|Identity Federation and Claim-based Security&lt;br /&gt;
|Andrea Cogliati&lt;br /&gt;
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:SAML and Claims-Based Security.pdf‎]]&lt;br /&gt;
|-&lt;br /&gt;
|2010, February&lt;br /&gt;
|DC AppSec Conference Recap&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP Rochester 2010 Feb.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2009, October&lt;br /&gt;
''October Hackerfest''&lt;br /&gt;
|Introduction to OWASP Rochester&lt;br /&gt;
|Ralph Durkee,&lt;br /&gt;
Lou Leone&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Intro to OWASP Rochester v9.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2009, September&lt;br /&gt;
|Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Media:Durkee Apache 2009 v7.ppt]], [[Media:Durkee Apache 2009 v7.odp|ODP]]&lt;br /&gt;
|-&lt;br /&gt;
|2009, May&lt;br /&gt;
|Key Management - One Perspective&lt;br /&gt;
|Lou Leone&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:N-tierKeyManagementIssues.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2009, May&lt;br /&gt;
''IEEE''&lt;br /&gt;
|Introduction to OWASP&lt;br /&gt;
|Ralph Durkee,&lt;br /&gt;
Andrea Cogliati&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Intro to OWASP Rochester v5.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2009, January&lt;br /&gt;
|Paranoid Programming Practices&lt;br /&gt;
|Lou Leone,&lt;br /&gt;
Aaron Witt&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:ParanoidProgrammers.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2008, May&lt;br /&gt;
|Database Encryption&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Database_Encryption.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2008, January&lt;br /&gt;
|SQL Injection and Dynamic SQL&lt;br /&gt;
|Andrea Cogliati&lt;br /&gt;
|[[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
|-&lt;br /&gt;
|2007, September&lt;br /&gt;
|2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP Top 10 2007 v6.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2006, October&lt;br /&gt;
|The first of the OWASP top ten: unvalidated input&lt;br /&gt;
|Steve Buck&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2006, April&lt;br /&gt;
|PGP: Encryption for e-mail and web applications&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
|2006, February&lt;br /&gt;
|Identity Theft, Phishing and Pharming&lt;br /&gt;
|Danny Allan&lt;br /&gt;
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
|2006, February&lt;br /&gt;
|Secure e-mail&lt;br /&gt;
|Thomas Bullinger&lt;br /&gt;
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/SecureEmail.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
|2006, January&lt;br /&gt;
|PCI Compliance&lt;br /&gt;
|Pat Massey,&lt;br /&gt;
Ralph Durkee,&lt;br /&gt;
&lt;br /&gt;
Maureen Baran&lt;br /&gt;
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
|2005, September&lt;br /&gt;
|Two Factor Authentication for Java Applications with Client Certificates&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf]], [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi SXI]&lt;br /&gt;
|-&lt;br /&gt;
|2005, April&lt;br /&gt;
|Avoiding Backend Exploitation of Mail Forms&lt;br /&gt;
|Max Kessler&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/owasp-mailform-exploitation.ppt]], [http://rd1.net/owasp/owasp-mailform-exploitation.sxi SXI]&lt;br /&gt;
|-&lt;br /&gt;
|2005, March&lt;br /&gt;
|Bringing Two-Factor Authentication to Web Applications&lt;br /&gt;
|Michael Starks&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt]], [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt SXI]&lt;br /&gt;
|-&lt;br /&gt;
|2005, February&lt;br /&gt;
|Insecure Storage&lt;br /&gt;
|Chris Karr&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Insecure_Storage.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2005, January&lt;br /&gt;
|Access Control and Session Mgmnt&lt;br /&gt;
|Steve Buck&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Jan_OWASP-access-control.ppt]], [http://rd1.net/owasp/Jan_OWASP-access-control.sxi SXI]&lt;br /&gt;
|-&lt;br /&gt;
|2004, November&lt;br /&gt;
|Intro to OWASP&lt;br /&gt;
|Ralph Durkee&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Nov_OWASP_20041103.ppt]]&lt;br /&gt;
|-&lt;br /&gt;
|2004, November&lt;br /&gt;
|Demonstration of SQL Injection attack and prevention&lt;br /&gt;
|Paul Cupo&lt;br /&gt;
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Nov_OWASP_20041103.ppt]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=203831</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=203831"/>
				<updated>2015-11-25T13:30:31Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Local Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by Oct 23rd to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement list] is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. &lt;br /&gt;
You can also review the e-mail archive of the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] lists to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:JohnNKing@owasp.org John King]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:JohnNKing@owasp.org John King]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement mailing list] and on the website. Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Presentation Slides: https://www.owasp.org/images/e/ec/Durkee_OWASP_2015_09_AppSec.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=201048</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=201048"/>
				<updated>2015-09-24T18:12:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by Oct 23rd to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement list] is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. &lt;br /&gt;
You can also review the e-mail archive of the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] lists to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement mailing list] and on the website. Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Presentation Slides: https://www.owasp.org/images/e/ec/Durkee_OWASP_2015_09_AppSec.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Durkee_OWASP_2015_09_AppSec.pdf&amp;diff=201047</id>
		<title>File:Durkee OWASP 2015 09 AppSec.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Durkee_OWASP_2015_09_AppSec.pdf&amp;diff=201047"/>
				<updated>2015-09-24T18:11:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: Presentation: Introduction to OWASP Application Security – Building and Breaking Applications

Ralph Durkee, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN
Principal Security Consultant

Application Security continues to be the most challenging and demand...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation: Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
Principal Security Consultant&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information.  Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software.  Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable.  The initial patch for the recent Android StageFright vulnerability is a prime example.  So yes, writing secure software is a serious challenge, but it can be done.  Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”.  We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200912</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200912"/>
				<updated>2015-09-21T20:46:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Meeting Dates &amp;amp; Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by Oct 23rd to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement list] is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. &lt;br /&gt;
You can also review the e-mail archive of the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] lists to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement mailing list] and on the website. Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200911</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200911"/>
				<updated>2015-09-21T20:44:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by Oct 23rd to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement list] is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. &lt;br /&gt;
You can also review the e-mail archive of the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] lists to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the [announcement mailing list] and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200910</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200910"/>
				<updated>2015-09-21T20:42:12Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Meeting Dates &amp;amp; Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by Oct 23rd to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the [announcement mailing list] and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200909</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200909"/>
				<updated>2015-09-21T20:38:49Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by Oct 23rd to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200908</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200908"/>
				<updated>2015-09-21T20:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Nov 6th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by Sept 10th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: NodeJS Security&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it&lt;br /&gt;
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm&lt;br /&gt;
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Jason Ross&lt;br /&gt;
&lt;br /&gt;
Jason Ross is a Senior Consultant specializing in web application&lt;br /&gt;
testing, Android application and device testing, and incident response&lt;br /&gt;
management. He has provided network and application vulnerability&lt;br /&gt;
assessment &amp;amp; penetration testing to a wide range of clients, including&lt;br /&gt;
US Government agencies and Fortune 100 companies.  He has also&lt;br /&gt;
developed and delivered training tools and programs to major clients&lt;br /&gt;
on topics such as advanced mobile penetration testing and forensic&lt;br /&gt;
techniques.&lt;br /&gt;
&lt;br /&gt;
Jason has a background in network incident response, forensic analysis&lt;br /&gt;
and Unix &amp;amp; Windows platform engineering. He is an independent security&lt;br /&gt;
researcher, and has spoken at numerous security conferences, including&lt;br /&gt;
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional&lt;br /&gt;
conferences. Jason is also an active participant in the anti-malware&lt;br /&gt;
community, and works with several highly vetted trust groups to track,&lt;br /&gt;
monitor, and mitigate malicious Internet activity.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200907</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=200907"/>
				<updated>2015-09-21T20:33:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Sept 18th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by Sept 10th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: OWASP Application Security – Building and Breaking Applications&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information.  Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software.  Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable.  The initial patch for the recent Android StageFright vulnerability is a prime example.  So yes, writing secure software is a serious challenge, but it can be done.  Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”.  We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.   &lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles -  https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Ralph Durkee&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit.  He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security.  Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Introduction to OWASP Application Security – Building and Breaking Applications&lt;br /&gt;
Date:  Sept 18th 12 noon - 1:30pm&lt;br /&gt;
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199564</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199564"/>
				<updated>2015-08-25T17:28:09Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Sept 18th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by Sept 10th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will be Pizza provide.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: OWASP Application Security – Building and Breaking Applications&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information.  Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software.  Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable.  The initial patch for the recent Android StageFright vulnerability is a prime example.  So yes, writing secure software is a serious challenge, but it can be done.  Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”.  We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.   &lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles -  https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Ralph Durkee&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit.  He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security.  Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199561</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199561"/>
				<updated>2015-08-25T15:27:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Sept 18th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
* (2nd floor above Constantino’s Grocery)&lt;br /&gt;
* Parking is for 2 hours outside the grocery store&lt;br /&gt;
* http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by Sept 10th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will food and drink, provide by the University of Rochester&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: OWASP Application Security – Building and Breaking Applications&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information.  Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software.  Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable.  The initial patch for the recent Android StageFright vulnerability is a prime example.  So yes, writing secure software is a serious challenge, but it can be done.  Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”.  We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.   &lt;br /&gt;
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
* OWASP Secure Coding Principles -  https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Ralph Durkee&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit.  He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security.  Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199560</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199560"/>
				<updated>2015-08-25T15:26:18Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; Sept 18th 12 noon - 1:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Univ of Rochester College Town – Building 3 &lt;br /&gt;
(2nd floor above Constantino’s Grocery)&lt;br /&gt;
Parking is for 2 hours outside the grocery store&lt;br /&gt;
http://www.collegetownrochester.com/map-directions/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by Sept 10th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will food and drink, provide by the University of Rochester&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: OWASP Application Security – Building and Breaking Applications&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Application Security continues to be the most challenging and demanding area for securing our information.  Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software.  Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable.  The initial patch for the recent Android StageFright vulnerability is a prime example.  So yes, writing secure software is a serious challenge, but it can be done.  Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”.  We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.   &lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013&lt;br /&gt;
&lt;br /&gt;
OWASP Secure Coding Principles -  https://www.owasp.org/index.php/Secure_Coding_Principles&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Ralph Durkee&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit.  He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security.  Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199555</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199555"/>
				<updated>2015-08-25T15:16:06Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; May 12th 6pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by May 5th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will free food and drink, provide by our meeting Sponsor, IBM &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: Application Security for Agile and Continuous Delivery&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Douglass Wilson, &lt;br /&gt;
IBM Distinguished Engineer, &lt;br /&gt;
CTO for Vulnerability, Risk and Compliance Products&lt;br /&gt;
IBM Security Systems IBU&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Application Security for Agile and Continuous Delivery&lt;br /&gt;
Date: May 12th, 2015 6pm&lt;br /&gt;
;Speaker: Douglass Wilson, IBM Distinguished Engineer&lt;br /&gt;
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU&lt;br /&gt;
* Free food and drink, provide by our meeting Sponsor, IBM&lt;br /&gt;
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199554</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=199554"/>
				<updated>2015-08-25T15:11:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Welcome to the OWASP Rochester Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; May 12th 6pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by May 5th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will free food and drink, provide by our meeting Sponsor, IBM &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: Application Security for Agile and Continuous Delivery&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Douglass Wilson, &lt;br /&gt;
IBM Distinguished Engineer, &lt;br /&gt;
CTO for Vulnerability, Risk and Compliance Products&lt;br /&gt;
IBM Security Systems IBU&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193580</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193580"/>
				<updated>2015-04-17T14:14:23Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; May 12th 6pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by May 5th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will free food and drink, provide by our meeting Sponsor, IBM &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: Application Security for Agile and Continuous Delivery&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Douglass Wilson, &lt;br /&gt;
IBM Distinguished Engineer, &lt;br /&gt;
CTO for Vulnerability, Risk and Compliance Products&lt;br /&gt;
IBM Security Systems IBU&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193579</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193579"/>
				<updated>2015-04-17T14:13:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; May 12th 6pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by May 5th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will free food and drink, provide by the meeting Sponsor, IBM &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentation: Application Security for Agile and Continuous Delivery&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Douglass Wilson, &lt;br /&gt;
IBM Distinguished Engineer, &lt;br /&gt;
CTO for Vulnerability, Risk and Compliance Products&lt;br /&gt;
IBM Security Systems IBU&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193578</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193578"/>
				<updated>2015-04-17T14:12:21Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP Chapter meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt; May 12th 6pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free.&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt;Please RSVP by May 5th to Ralph.Durkee @ OWASP.org.&lt;br /&gt;
&lt;br /&gt;
There will free food and drink, provide by the meeting Sponsor, IBM &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Application Security for Agile and Continuous Delivery&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt;&lt;br /&gt;
Douglass Wilson, &lt;br /&gt;
IBM Distinguished Engineer, &lt;br /&gt;
CTO for Vulnerability, Risk and Compliance Products&lt;br /&gt;
IBM Security Systems IBU&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193576</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=193576"/>
				<updated>2015-04-17T13:57:28Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 15th 5:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody 1300 Clinton Square, 13th floor, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free, but seating is limited, and advance registration is required.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by March 31st to Ralph.Durkee @ OWASP.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities.  In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow.  We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows. &lt;br /&gt;
&lt;br /&gt;
The course will use a virtual Linux system with the required tools running on your own laptop.  Attendees should be comfortable with the Linux command line, and be familiar with basic C/C++ programming.  We'll be using the Gnu development tools such as gcc, gdb, and make. Vim, Emacs and Eclipse will all be installed for your editing and exploit writing pleasure. You must bring your own laptop. The laptop can be MS Windows, Mac or Linux, just make sure you have a recent version of VirtualBox installed and working.   Having a DVD reader is recommended for transferring the VM, but we will also have a single shared USB DVD drive available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Laptop Requirements:&amp;lt;/b&amp;gt;&lt;br /&gt;
At least 4Gb RAM&lt;br /&gt;
&lt;br /&gt;
    20 Gb of free disk space&lt;br /&gt;
    Recent version of Virtual Box installed and working.&lt;br /&gt;
    Administrator or root privileges for the laptop.&lt;br /&gt;
    Comfortable with Linux Command Line and g++ / gcc.&lt;br /&gt;
    Some C/C++ Programming is recommended.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Biography&amp;lt;/b&amp;gt;&lt;br /&gt;
Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&lt;br /&gt;
Date: Apr 15, 2015 5:30pm&lt;br /&gt;
;Speaker: Ralph Durkee&lt;br /&gt;
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. &lt;br /&gt;
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. &lt;br /&gt;
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=191714</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=191714"/>
				<updated>2015-03-19T00:11:48Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester OWASP  Chapter meeting April 15th 5:30pm at Nixon Peabody */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester OWASP Chapter meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 15th 5:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody 1300 Clinton Square, 13th floor, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; The meeting is free, but seating is limited, and advance registration is required.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; Please RSVP by March 31st to Ralph.Durkee @ OWASP.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities.  In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow.  We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows. &lt;br /&gt;
&lt;br /&gt;
The course will use a virtual Linux system with the required tools running on your own laptop.  Attendees should be comfortable with the Linux command line, and be familiar with basic C/C++ programming.  We'll be using the Gnu development tools such as gcc, gdb, and make. Vim, Emacs and Eclipse will all be installed for your editing and exploit writing pleasure. You must bring your own laptop. The laptop can be MS Windows, Mac or Linux, just make sure you have a recent version of VirtualBox installed and working.   Having a DVD reader is recommended for transferring the VM, but we will also have a single shared USB DVD drive available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Laptop Requirements:&amp;lt;/b&amp;gt;&lt;br /&gt;
At least 4Gb RAM&lt;br /&gt;
&lt;br /&gt;
    20 Gb of free disk space&lt;br /&gt;
    Recent version of Virtual Box installed and working.&lt;br /&gt;
    Administrator or root privileges for the laptop.&lt;br /&gt;
    Comfortable with Linux Command Line and g++ / gcc.&lt;br /&gt;
    Some C/C++ Programming is recommended.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Biography&amp;lt;/b&amp;gt;&lt;br /&gt;
Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=191713</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=191713"/>
				<updated>2015-03-19T00:04:26Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester Security Summit ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   Oct 7-8, 2014 8am - 4:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Hyatt Regency, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $200&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; https://www.rochestersecurity.org/ &lt;br /&gt;
&lt;br /&gt;
OWASP presentations:&lt;br /&gt;
&lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Date: Oct 7-8, 2014 8am - 4:30pm&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=191712</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=191712"/>
				<updated>2015-03-19T00:03:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester Security Summit ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   Oct 7-8, 2014 8am - 4:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Hyatt Regency, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $200&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; https://www.rochestersecurity.org/ &lt;br /&gt;
&lt;br /&gt;
OWASP presentations:&lt;br /&gt;
&lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;Rochester Security Summit&lt;br /&gt;
Topics: &lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
Location: Hyatt Regency, Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182896</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182896"/>
				<updated>2014-09-26T01:58:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Local Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester Security Summit ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   Oct 7-8, 2014 8am - 4:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Hyatt Regency, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $200&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; https://www.rochestersecurity.org/ &lt;br /&gt;
&lt;br /&gt;
OWASP presentations:&lt;br /&gt;
&lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182895</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182895"/>
				<updated>2014-09-26T01:57:19Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Rochester Security Summit */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester Security Summit ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   Oct 7-8, 2014 8am - 4:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Hyatt Regency, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $200&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; https://www.rochestersecurity.org/ &lt;br /&gt;
&lt;br /&gt;
OWASP presentations:&lt;br /&gt;
&lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)&lt;br /&gt;
* Building a Software Security Program (Kuai Hinojosa)&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182894</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182894"/>
				<updated>2014-09-26T01:55:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Security Development Lifecycle */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Rochester Security Summit ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   Oct 7-8, 2014 8am - 4:30pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Hyatt Regency, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Cost:&amp;lt;/b&amp;gt; $200&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;To Register:&amp;lt;/b&amp;gt; https://www.rochestersecurity.org/ &lt;br /&gt;
&lt;br /&gt;
OWASP presentations:&lt;br /&gt;
&lt;br /&gt;
* Top Ten Web Defenses (Jim Manico)&lt;br /&gt;
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)&lt;br /&gt;
* Docker and Linux Containers for Infosec Professionals (Kaar)&lt;br /&gt;
* Building a Software Security Program (Hinojosa)&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182893</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182893"/>
				<updated>2014-09-26T01:47:59Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Security Development Lifecycle ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   June 20, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Larry Kovnat. Food will be provided so please register by sending an email. You can park below the building and bring your parking pass for validation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Embedded controllers are being incorporated into electro-mechanical devices and connected to the Internet at an increasing rate, yet the developers of such equipment often have little experience in assessing the security risks.  Management and developers both are quick to grasp the advantages of embedded control and connectivity, yet often underestimate the vulnerabilities that may be unintentionally introduced. This talk will discuss real-world aspects of gaining the trust and support of both management and developers for the use of a security development lifecycle and how such an approach results in better product quality and lower product acquisition costs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; &lt;br /&gt;
Larry Kovnat (CISSP, CISM) was previously Senior Product Security Manager at Xerox Corporation, and is a widely recognized expert in embedded systems security. At Xerox, Larry led the effort to build security into the embedded controllers of advanced hardcopy multifunction devices. Larry brought a risk assessment and mitigation approach to secure development and instituted a secure product development lifecycle that distinguished Xerox as a leader in hardcopy device security, with over 50 products achieving Common Criteria certification from multiple international schemes. Now an independent consultant, Larry has long experience in product development and product security at the senior management level.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Speaker: Larry Kovnat (CISSP, CISM)&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182892</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=182892"/>
				<updated>2014-09-26T01:46:56Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Security Development Lifecycle ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   June 20, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Larry Kovnat. Food will be provided so please register by sending an email. You can park below the building and bring your parking pass for validation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Embedded controllers are being incorporated into electro-mechanical devices and connected to the Internet at an increasing rate, yet the developers of such equipment often have little experience in assessing the security risks.  Management and developers both are quick to grasp the advantages of embedded control and connectivity, yet often underestimate the vulnerabilities that may be unintentionally introduced. This talk will discuss real-world aspects of gaining the trust and support of both management and developers for the use of a security development lifecycle and how such an approach results in better product quality and lower product acquisition costs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; &lt;br /&gt;
Larry Kovnat (CISSP, CISM) was previously Senior Product Security Manager at Xerox Corporation, and is a widely recognized expert in embedded systems security. At Xerox, Larry led the effort to build security into the embedded controllers of advanced hardcopy multifunction devices. Larry brought a risk assessment and mitigation approach to secure development and instituted a secure product development lifecycle that distinguished Xerox as a leader in hardcopy device security, with over 50 products achieving Common Criteria certification from multiple international schemes. Now an independent consultant, Larry has long experience in product development and product security at the senior management level.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;June 20 2014 Meeting&lt;br /&gt;
Topic: Security Development Lifecycle&lt;br /&gt;
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=153126</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=153126"/>
				<updated>2013-06-07T12:13:17Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Security Development Lifecycle */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Security Development Lifecycle ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   June 20, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Larry Kovnat. Food will be provided so please register by sending an email. You can park below the building and bring your parking pass for validation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Embedded controllers are being incorporated into electro-mechanical devices and connected to the Internet at an increasing rate, yet the developers of such equipment often have little experience in assessing the security risks.  Management and developers both are quick to grasp the advantages of embedded control and connectivity, yet often underestimate the vulnerabilities that may be unintentionally introduced. This talk will discuss real-world aspects of gaining the trust and support of both management and developers for the use of a security development lifecycle and how such an approach results in better product quality and lower product acquisition costs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; &lt;br /&gt;
Larry Kovnat (CISSP, CISM) was previously Senior Product Security Manager at Xerox Corporation, and is a widely recognized expert in embedded systems security. At Xerox, Larry led the effort to build security into the embedded controllers of advanced hardcopy multifunction devices. Larry brought a risk assessment and mitigation approach to secure development and instituted a secure product development lifecycle that distinguished Xerox as a leader in hardcopy device security, with over 50 products achieving Common Criteria certification from multiple international schemes. Now an independent consultant, Larry has long experience in product development and product security at the senior management level.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150167</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150167"/>
				<updated>2013-04-20T09:16:27Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150166</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150166"/>
				<updated>2013-04-20T09:16:13Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150165</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150165"/>
				<updated>2013-04-20T09:15:37Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150164</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150164"/>
				<updated>2013-04-20T09:15:16Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150163</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150163"/>
				<updated>2013-04-20T09:14:53Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
 &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150162</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150162"/>
				<updated>2013-04-20T09:13:50Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ralph_Durkee_Pen_Test_v24L_handout.pdf&amp;diff=150161</id>
		<title>File:Ralph Durkee Pen Test v24L handout.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ralph_Durkee_Pen_Test_v24L_handout.pdf&amp;diff=150161"/>
				<updated>2013-04-20T09:12:50Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: Rochester OWASP Presentation April 2013
Ralph Durkee
Topic: Ethical Hacking as a Professional Penetration Testing Technique&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Rochester OWASP Presentation April 2013&lt;br /&gt;
Ralph Durkee&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150160</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=150160"/>
				<updated>2013-04-20T09:07:47Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;April Meeting 2013&lt;br /&gt;
Topic: Ethical Hacking as a Professional Penetration Testing Technique &amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149383</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149383"/>
				<updated>2013-04-07T19:17:46Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Welcome to the OWASP Rochester Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149382</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149382"/>
				<updated>2013-04-07T19:15:51Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Past Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149381</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149381"/>
				<updated>2013-04-07T19:13:54Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Meeting Dates &amp;amp; Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; Meetings are announced via the announcmenet mailing list and on the website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149380</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149380"/>
				<updated>2013-04-07T19:09:33Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to the announcement list to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149379</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149379"/>
				<updated>2013-04-07T19:08:58Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Participation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149378</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149378"/>
				<updated>2013-04-07T19:04:04Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149377</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149377"/>
				<updated>2013-04-07T19:03:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149376</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149376"/>
				<updated>2013-04-07T19:02:02Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by responding for this invite by responding to this invite or sending an email to info@rocissa.org. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.&lt;br /&gt;
&lt;br /&gt;
Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Bio:&amp;lt;/b&amp;gt; Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 &amp;amp; SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149375</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149375"/>
				<updated>2013-04-07T19:00:00Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149374</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149374"/>
				<updated>2013-04-07T18:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Local Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149373</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149373"/>
				<updated>2013-04-07T18:58:41Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149372</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149372"/>
				<updated>2013-04-07T18:58:05Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [mailto:Ralph.Durkee@Owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149371</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149371"/>
				<updated>2013-04-07T18:57:42Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Ethical Hacking as a Professional Penetration Testing Technique */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [Mailto:Ralph.Durkee@Owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149370</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=149370"/>
				<updated>2013-04-07T18:57:14Z</updated>
		
		<summary type="html">&lt;p&gt;Rdurkee: /* Welcome to the OWASP Rochester Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ], Acting Lead&lt;br /&gt;
&lt;br /&gt;
== Ethical Hacking as a Professional Penetration Testing Technique ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;   April 18, 2013 @ 5:30 PM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; RIT's Golisano Hall Auditorium (Building 70, Room 1400&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to &amp;lt;/b&amp;gt; [[Mailto: Ralph.Durkee@Owasp.org]]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2012&lt;br /&gt;
Mercury Networks Security Summit&lt;br /&gt;
Tpoic: Mozilla's Content Security Policy&lt;br /&gt;
Speaker: Lou Leone &amp;lt;br/&amp;gt;&lt;br /&gt;
https://www.owasp.org/images/9/95/2012_CSP.pptx&lt;br /&gt;
&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Rdurkee</name></author>	</entry>

	</feed>