<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tarek</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tarek"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Tarek"/>
		<updated>2026-04-30T10:36:41Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227338</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227338"/>
				<updated>2017-03-14T05:40:41Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Middle East Partners with MISTI Europe ===&lt;br /&gt;
----&lt;br /&gt;
[[File:CISO_ME.png]]&lt;br /&gt;
&lt;br /&gt;
Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!&lt;br /&gt;
&lt;br /&gt;
'''You can get a 20% off by using the follow code: OWASP17'''&lt;br /&gt;
&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&amp;lt;br&amp;gt;Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&amp;lt;br&amp;gt;If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227284</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227284"/>
				<updated>2017-03-12T10:22:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Middle East Partners with MISTI Europe ===&lt;br /&gt;
----&lt;br /&gt;
[[File:CISO_ME.png]]&lt;br /&gt;
&lt;br /&gt;
Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!&lt;br /&gt;
&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227283</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227283"/>
				<updated>2017-03-12T10:19:18Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Middle East Partners with MISTI Europe ===&lt;br /&gt;
----&lt;br /&gt;
'''&amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;[[File:CISO_ME.png]]&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!&lt;br /&gt;
&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227282</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227282"/>
				<updated>2017-03-12T10:17:53Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Middle East Partners with MISTI Europe ===&lt;br /&gt;
----&lt;br /&gt;
'''&amp;lt;code&amp;gt;[http://www.cisomiddleeast.misti.com/ &amp;lt;nowiki&amp;gt;[[File:CISO_ME.png]]&amp;lt;/nowiki&amp;gt;]&amp;lt;/code&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!&lt;br /&gt;
&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CISO_ME.png&amp;diff=227281</id>
		<title>File:CISO ME.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CISO_ME.png&amp;diff=227281"/>
				<updated>2017-03-12T10:15:41Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227280</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227280"/>
				<updated>2017-03-12T05:42:38Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Middle East Partners with MISTI Europe ===&lt;br /&gt;
----&lt;br /&gt;
Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227279</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227279"/>
				<updated>2017-03-12T05:41:07Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
=== OWASP Middle East Partners with MISTI Europe ===&lt;br /&gt;
Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227278</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=227278"/>
				<updated>2017-03-12T05:32:27Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
== OWASP Middle East Partners with MISTI Europe ==&lt;br /&gt;
&lt;br /&gt;
'''Returning to the [http://habtoor-grand-beach-resort-spa.hotels-in-dubai.org/en/ Habtoor Grand Resort], 27-29 March 2017, the 9th annual [http://www.cisomiddleeast.misti.com/?_ga=1.114765698.486057116.1487900262 CISO Middle East Conference &amp;amp; Roundtable] has new topics, revised sessions and world-class speakers that will leave you on the edge of your seat. With the agenda focusing on burning issues such as phishing attacks, how digital transformation is changing the threat landscape and security/privacy challenges of IoT, we are certain there is something for everyone. If you haven't secured your spot yet, now is the time!'''&lt;br /&gt;
&lt;br /&gt;
Book now, attend the conference, and you'll automatically be entered into the prize drawer to win one of three Amazon Echo Dots! (Please note, delegates can only win once, and you must be present on the day to win).&lt;br /&gt;
&lt;br /&gt;
Now while we know you don't have the voice service that powers Echo, Alexa, to assist you quite yet in planning your time at the event, you can still download a copy of the [http://training.misti.com/acton/form/10465/004e:d-0001/0/-/-/-/-/index.htminteractive event brochure here]. &lt;br /&gt;
&lt;br /&gt;
If you have any inquiries regarding the event or would like to register, please get in touch with [mailto:cclarke@misti.com Chris Clarke] directly.'''&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=226798</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=226798"/>
				<updated>2017-02-27T09:46:29Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=226797</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=226797"/>
				<updated>2017-02-27T09:44:34Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''7th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=226796</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=226796"/>
				<updated>2017-02-27T09:44:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek Naja]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
'''77th of Feb 2017 at 12:30pm'''&lt;br /&gt;
   Abu Dhabi Cyber Resilience &amp;amp; InfoSeC &lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Cracking Passwords for Security's Sake &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He currently the head of information security at a major middle east organization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''27th of August 2014 at 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; OWASP Top 10 A2 - Broken Authentication and session management &lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/tareknaja Tarek Naja]&lt;br /&gt;
: Bio: Tarek is the OWASP UAE chapter leader.  He is a seasoned security consultant who focuses on penetration testing.&lt;br /&gt;
&lt;br /&gt;
; OWASP Top 10 A3 - Cross site scripting (XSS)&lt;br /&gt;
: Speaker: [http://ae.linkedin.com/in/mhendrickx Michael Hendrickx]&lt;br /&gt;
: Bio: Michael is an experienced IT security professional with strong, deep technical knowledge on wide variety of applications. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''28th of May, 2014. 6:30pm'''&lt;br /&gt;
   Nakheel Sales Office [https://maps.google.com/maps?q=Nakheel+Sales+Center+-+Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;hl=en&amp;amp;ll=25.104759,55.156517&amp;amp;spn=0.038589,0.066047&amp;amp;sll=31.128199,-72.773437&amp;amp;sspn=71.247495,135.263672&amp;amp;oq=Nakheel&amp;amp;dirflg=r&amp;amp;ttype=now&amp;amp;noexp=0&amp;amp;noal=0&amp;amp;sort=def&amp;amp;hq=Nakheel+Sales+Center+-&amp;amp;hnear=Al+Sufouh+-+Dubai+-+United+Arab+Emirates&amp;amp;t=m&amp;amp;z=15 MAP]&lt;br /&gt;
   Al Sufouh Road,&lt;br /&gt;
   Jumeirah - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
We're honored to have our guest speak [http://ae.linkedin.com/pub/ammar-almarzooqi/30/b11/b86 Ammar Almarzooqi] - Chief Information Security Officer at Abu Dhabi Department of Economic Development.&lt;br /&gt;
&lt;br /&gt;
Ammar will be talking about seamless implementation of security controls. If you're dealing with some elements that are inherently secure, such as an application that cannot be modified, how would you be able to secure your environment? Ammar will be addressing this question and discussing a real case scenario from his organization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Our other presenter is [http://ae.linkedin.com/in/tareknaja Tarek Naja] - Senior Security Consultant. &lt;br /&gt;
Tarek will be answering questions about the vulnerability you all heard about recently: Heart Bleed. Tarek specializes in penetration testing, mainly web application and mobile application penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''19th of Feb 2014 at 8pm'''&lt;br /&gt;
   Cafe Rider [http://cafe-rider.com/styled-4/index.html MAP]&lt;br /&gt;
   Close to Mall of the Emirates&lt;br /&gt;
   Al Quoz Industrial - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
; Managing Web &amp;amp; Application Security with OWASP – bringing it all together&lt;br /&gt;
: Setting up, managing and improving your global information security organisation using mature OWASP projects and tools. Achieving cost-effective application security and bringing it all together on the management level. A journey through different organisational stages and how OWASP tools help organisations moving forward improving their web and application security. This talk will discuss a number of quick wins and how to effectively manage global security initiatives and use OWASP tools inside your organisation&lt;br /&gt;
&lt;br /&gt;
; Application Security for managers: OWASP CISO Guide and CISO Survey&lt;br /&gt;
: The OWASP CISO guide and CISO report 2013. This talk will present two new OWASP projects, the CISO guide and the newly released results of the OWASP CISO Survey report 2013. Their main goal is to provide guidance on application and web security for senior managers and to introduce Chief Information Security Officers (CISO) to the OWASP Application Security Guide and the results of the CISO Survey. Over the last years, we noticed that application security risks and threats have been on the rise and OWASP has started the CISO survey project to gather intelligence and provide it to CISOs and senior managers in order to improve their security strategies, assess their priorities and learn from their peers about what works best protecting web and application security in organizations across various industries.&lt;br /&gt;
&lt;br /&gt;
Speaker: [http://hk.linkedin.com/in/gondrom Tobias Gondrom]&lt;br /&gt;
&lt;br /&gt;
Tobias Gondrom is a global board member of OWASP (Open Web Application Security Project) and CEO at Thames Stanley, a boutique Global CISO and Information Security &amp;amp; Risk Management Advisory based in Hong Kong, United Kingdom and Germany.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirates&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Casual OWASP meetup'''&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:United Arab Emirates]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Santoku.png&amp;diff=153109</id>
		<title>File:Santoku.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Santoku.png&amp;diff=153109"/>
				<updated>2013-06-07T10:56:05Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: uploaded a new version of &amp;amp;quot;File:Santoku.png&amp;amp;quot;: Reverted to version as of 11:58, 6 June 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;santoku screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Santoku.png&amp;diff=153108</id>
		<title>File:Santoku.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Santoku.png&amp;diff=153108"/>
				<updated>2013-06-07T10:55:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: uploaded a new version of &amp;amp;quot;File:Santoku.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;santoku screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153107</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153107"/>
				<updated>2013-06-07T10:52:18Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:1-_sdk_manager.png]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below.&lt;br /&gt;
&lt;br /&gt;
[[File:install emulator.png]]&lt;br /&gt;
&lt;br /&gt;
Once the installation is complete you'll need to create a new AVD simply by clicking on New on the Android Virtual Device Manager&lt;br /&gt;
&lt;br /&gt;
[[File:andoird avd new.png]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:create avd.png]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:working emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:apk.png]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:adb install.png]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:proxy command.png]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:mallory.png]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular application there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
[[File:shell.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
[[File:ddms.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
[[File:mem analyzer.png]]&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily there's a ready made Linux distro called Santoku that has all the tools preinstalled.&lt;br /&gt;
&lt;br /&gt;
[[File:Santoku.png]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Santoku.png&amp;diff=153028</id>
		<title>File:Santoku.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Santoku.png&amp;diff=153028"/>
				<updated>2013-06-06T11:58:08Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: santoku screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;santoku screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mem_analyzer.png&amp;diff=153027</id>
		<title>File:Mem analyzer.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mem_analyzer.png&amp;diff=153027"/>
				<updated>2013-06-06T11:57:15Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: eclipse memory analyze screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;eclipse memory analyze screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ddms.png&amp;diff=153026</id>
		<title>File:Ddms.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ddms.png&amp;diff=153026"/>
				<updated>2013-06-06T11:56:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: Dalvik Debug Monitor Server (DDMS) screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dalvik Debug Monitor Server (DDMS) screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Shell.png&amp;diff=153025</id>
		<title>File:Shell.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Shell.png&amp;diff=153025"/>
				<updated>2013-06-06T11:55:33Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: android emulator shell command&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;android emulator shell command&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Mallory.png&amp;diff=153024</id>
		<title>File:Mallory.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Mallory.png&amp;diff=153024"/>
				<updated>2013-06-06T11:55:09Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: mallory proxy logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;mallory proxy logo&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Proxy_command.png&amp;diff=153021</id>
		<title>File:Proxy command.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Proxy_command.png&amp;diff=153021"/>
				<updated>2013-06-06T11:54:16Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: android emulator http proxy command&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;android emulator http proxy command&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Adb_install.png&amp;diff=153020</id>
		<title>File:Adb install.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Adb_install.png&amp;diff=153020"/>
				<updated>2013-06-06T11:53:57Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: install Android Debugging Bridge (adb) command&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;install Android Debugging Bridge (adb) command&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Apk.png&amp;diff=153018</id>
		<title>File:Apk.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Apk.png&amp;diff=153018"/>
				<updated>2013-06-06T11:53:19Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: android package (apk) screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;android package (apk) screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153016</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153016"/>
				<updated>2013-06-06T11:52:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:1-_sdk_manager.png]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below.&lt;br /&gt;
&lt;br /&gt;
[[File:install emulator.png]]&lt;br /&gt;
&lt;br /&gt;
Once the installation is complete you'll need to create a new AVD simply by clicking on New on the Android Virtual Device Manager&lt;br /&gt;
&lt;br /&gt;
[[File:andoird avd new.png]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:create avd.png]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:working emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:apk.png]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:adb install.png]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:proxy command.png]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:mallory.png]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular application there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
[[File:shell.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
[[File:ddms.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
[[File:mem analyzer.png]]&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at OWASP has saved us a lot of trouble. OWASPhas created a backtrack like OSfor mobile testing called Santoku.&lt;br /&gt;
&lt;br /&gt;
[[File:Santoku.png]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Working_emulator.png&amp;diff=153015</id>
		<title>File:Working emulator.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Working_emulator.png&amp;diff=153015"/>
				<updated>2013-06-06T11:52:30Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: android emulator screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;android emulator screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Create_avd.png&amp;diff=153014</id>
		<title>File:Create avd.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Create_avd.png&amp;diff=153014"/>
				<updated>2013-06-06T11:51:52Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: create android virtual device (avd)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;create android virtual device (avd)&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Andoird_avd_new.png&amp;diff=153012</id>
		<title>File:Andoird avd new.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Andoird_avd_new.png&amp;diff=153012"/>
				<updated>2013-06-06T11:51:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: create new android emulator screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;create new android emulator screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153011</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153011"/>
				<updated>2013-06-06T11:50:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:1-_sdk_manager.png]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below.&lt;br /&gt;
&lt;br /&gt;
[[File:install emulator.png]]&lt;br /&gt;
&lt;br /&gt;
Once the installation is complete you'll need to create a new AVD simply by clicking on New on the Android Virtual Device Manager&lt;br /&gt;
&lt;br /&gt;
[[File:andoird avd new.png]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:create avd.png]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:working emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:apk.pgn]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:adb install.png]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:proxy command.png]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:mallory.png]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular application there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
[[File:shell.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
[[File:ddms.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
[[File:mem analyzer.png]]&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at OWASP has saved us a lot of trouble. OWASPhas created a backtrack like OSfor mobile testing called Santoku.&lt;br /&gt;
&lt;br /&gt;
[[File:Santoku.png]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153009</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153009"/>
				<updated>2013-06-06T11:50:12Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:1-_sdk_manager.png]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below.&lt;br /&gt;
&lt;br /&gt;
[[File:install emulator.png]]&lt;br /&gt;
&lt;br /&gt;
Once the installation is complete you'll need to create a new AVD simply by clicking on New on the Android Virtual Device Manager&lt;br /&gt;
&lt;br /&gt;
[[File:andoird avd new.pgn]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:create avd.png]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:working emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:apk.pgn]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:adb install.png]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:proxy command.png]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:mallory.png]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular application there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
[[File:shell.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
[[File:ddms.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
[[File:mem analyzer.png]]&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at OWASP has saved us a lot of trouble. OWASPhas created a backtrack like OSfor mobile testing called Santoku.&lt;br /&gt;
&lt;br /&gt;
[[File:Santoku.png]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Install_emulator.png&amp;diff=153007</id>
		<title>File:Install emulator.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Install_emulator.png&amp;diff=153007"/>
				<updated>2013-06-06T11:47:01Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: install android emulator screenshot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;install android emulator screenshot&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153006</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153006"/>
				<updated>2013-06-06T11:46:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:1-_sdk_manager.png]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below. You click on New and here's what these options mean.&lt;br /&gt;
&lt;br /&gt;
[[File:install emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:create avd.png]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:working emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:apk.pgn]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:adb install.png]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:proxy command.png]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:mallory.png]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular application there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
[[File:shell.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
[[File:ddms.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
[[File:mem analyzer.png]]&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at OWASP has saved us a lot of trouble. OWASPhas created a backtrack like OSfor mobile testing called Santoku.&lt;br /&gt;
&lt;br /&gt;
[[File:Santoku.png]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153005</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153005"/>
				<updated>2013-06-06T11:44:58Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:sdk manager.png]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below. You click on New and here's what these options mean.&lt;br /&gt;
&lt;br /&gt;
[[File:install emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:create avd.png]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:working emulator.png]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:apk.pgn]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:adb install.png]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:proxy command.png]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:mallory.png]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular application there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
[[File:shell.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
[[File:ddms.png]]&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
[[File:mem analyzer.png]]&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at OWASP has saved us a lot of trouble. OWASPhas created a backtrack like OSfor mobile testing called Santoku.&lt;br /&gt;
&lt;br /&gt;
[[File:Santoku.png]]&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:1-_sdk_manager.png&amp;diff=153004</id>
		<title>File:1- sdk manager.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:1-_sdk_manager.png&amp;diff=153004"/>
				<updated>2013-06-06T11:38:10Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153003</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153003"/>
				<updated>2013-06-06T11:32:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can perform mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. It's a straight forward install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks like the picture below. You click on New and here's what these options mean.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. In reality it's a zipped file based on JAR format which will come in handy when we try to reverse the application later.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the platform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems to be a lot of ways documented to overcome this. One my favorite is using Mallory.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called Mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit tedious but the process is well documented online.&lt;br /&gt;
&lt;br /&gt;
[[File:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular WAVA there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools. Here's an example of a class Adel found the encryption key in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at OWASP has saved us a lot of trouble. OWASPhas created a backtrack like OSfor mobile testing called Santoku.&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153002</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153002"/>
				<updated>2013-06-06T11:26:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can do mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. I usually go with the latest version. It's a straight forward next install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks something like this. You click on New and here's what these options mean.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Create AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
Diff between Android and Google API?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. It sounds fancy but it's really a zipped file based on JAR format which will come in handy when we try to reverse the application later. Usually the client will provide this file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the paltform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems a lot of ways to documented to overcome this but non has worked for me. So if anyone has any tips or solutions please do share hem with me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit of pain but the process is well documented online. If you need the resources let me know and I'll send them over.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular WAVA there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools. Here's an example of a class Adel found the encryption key in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at owasp and our french t&amp;amp;v team has saved us a lot of trouble. Owasp has created a backtrack like os for mobile testing called santoku. And the good guys in our french team namely alaeddin and adel have created working vms and avds to save us all some time. So feel free to reach out for them and ask them for those&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153001</id>
		<title>SettingupMobileTestingLab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SettingupMobileTestingLab&amp;diff=153001"/>
				<updated>2013-06-06T11:25:41Z</updated>
		
		<summary type="html">&lt;p&gt;Tarek: Created page with &amp;quot;This document details how to set up an Android lab so you can do mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and us...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This document details how to set up an Android lab so you can do mobile app assessments without the need for a physical mobile phone. It will discuss some of the common and useful tools, what their purposes are and how they can be used.&lt;br /&gt;
&lt;br /&gt;
The prerequisites are simple: Java and an OS.&lt;br /&gt;
&lt;br /&gt;
URL: http://java.com/en/download/index.jsp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1- Install Android Software Development Kit (SDK) ==&lt;br /&gt;
&lt;br /&gt;
“The Android SDK provides you the API libraries and developer tools necessary to build, test, and debug apps for Android”. There are two parts to SDK. The SDK manager where you can install the tools and the Android versions of your choice. And the AVD (android virtual device) manager (we'll get to that in a minute). That's what creates the emulator that we'll be playing around with.&lt;br /&gt;
&lt;br /&gt;
URL: http://developer.android.com/sdk/index.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2- Install tools ==&lt;br /&gt;
&lt;br /&gt;
Install the tools and the Android OS. At a minimum you'll want the SDK tools and SDK platform tools which we'll use later on. Then choose an Android version. There's a long list of Android versions and other extras. I usually go with the latest version. It's a straight forward next install process but it might take a while.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3- Emulator ==&lt;br /&gt;
&lt;br /&gt;
Step three is to set up an Android emulator. You do this using the AVD manager which is part of the SDK tool. AVD stands for Android Virtual Device and it looks something like this. You click on New and here's what these options mean.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 4- Creat AVD ==&lt;br /&gt;
&lt;br /&gt;
Enter a name for your virtualized Android, and select the version of Android you want to use from the drop-down menu if you've installed different versions. Enter a size under the SD Card entry; this is a virtual SD card that’s actually an IMG file that Android will use to store your settings and files in.&lt;br /&gt;
&lt;br /&gt;
Diff between Android and Google API?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 5- Start Emulator ==&lt;br /&gt;
&lt;br /&gt;
By now you'll have a fully functioning emulator that you can use just like your phone. One thing you'll notice missing is the Android market or play store which you usually use to download and install applications. The good news is that we don't need it... for now.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 6- Install apk ==&lt;br /&gt;
&lt;br /&gt;
without the need of the android market we can install the application directly if we have the .apk file. This is the Android Application Package (APK) file. It sounds fancy but it's really a zipped file based on JAR format which will come in handy when we try to reverse the application later. Usually the client will provide this file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 7- ADB ==&lt;br /&gt;
&lt;br /&gt;
To install apk file we use the Android Debugging Bridge. The ADB tool part of the paltform-tools we installed with the SDK manager at the beginning. It's got a lot of uses one of which is to install and uninstall app. We do this by typing going to the platform-tools directory and lunching adb with the install command while the emulator is running&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 8- Proxy ==&lt;br /&gt;
&lt;br /&gt;
Start up the emulator using the proxy command to tell it to tunnel traffic through your local proxy. In this current setup you'll also be able to test https website but you'll not be able to authenticate if there's a login page because of certificate errors. There seems a lot of ways to documented to overcome this but non has worked for me. So if anyone has any tips or solutions please do share hem with me.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 9- Mallory ==&lt;br /&gt;
&lt;br /&gt;
What if the application you're testing that doesn't use standard http/s but instead uses some proprietary protocol? There's a tool for that called mallory. It's a very effective transparent TCP/UDP proxy. Setting it up is a bit of pain but the process is well documented online. If you need the resources let me know and I'll send them over.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 10- Decompiling app (jd-gui) ==&lt;br /&gt;
&lt;br /&gt;
Apart from treating the application as a regular WAVA there are a few other things to do. One is trying to decompile the application. We already mentioned that the .apk is a compressed JAR format and so it can easily be decompiled using numerous tools. Here's an example of a class Adel found the encryption key in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 11- Shell ==&lt;br /&gt;
&lt;br /&gt;
We can browse the application directory using the adb tool. By issuing the shell command we can browse to the /data/data folder where the packages are installed. We can then look for interesting information such as encryption keys in xml files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 12- Memory ==&lt;br /&gt;
&lt;br /&gt;
Android ships with a debugging tool called the Dalvik Debug Monitor Server (DDMS). This is part of the Eclipse tool suite so obviously we need to install Eclipe. We can use this to obtain a memory dump of the application during runtime. This hopefully will yield some good information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 13-Memory Analyzer ==&lt;br /&gt;
&lt;br /&gt;
Once we create a dump we can analyze it using a tool called the (can any one guess) Memory Analyzer which is part of Eclipse. However before we can do that we need to convert the dump to the proper hprof format using hprof-conv in sdk&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 14- Santoku ==&lt;br /&gt;
&lt;br /&gt;
Now if all this sounds like a lot of work luckily the good guys at owasp and our french t&amp;amp;v team has saved us a lot of trouble. Owasp has created a backtrack like os for mobile testing called santoku. And the good guys in our french team namely alaeddin and adel have created working vms and avds to save us all some time. So feel free to reach out for them and ask them for those&lt;/div&gt;</summary>
		<author><name>Tarek</name></author>	</entry>

	</feed>