<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Trevor.Hawthorn</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Trevor.Hawthorn"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Trevor.Hawthorn"/>
		<updated>2026-05-06T17:20:20Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122821</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122821"/>
				<updated>2012-01-16T16:13:33Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122820</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122820"/>
				<updated>2012-01-16T16:13:05Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122819</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122819"/>
				<updated>2012-01-16T16:12:54Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122818</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122818"/>
				<updated>2012-01-16T16:12:37Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122817</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122817"/>
				<updated>2012-01-16T16:11:35Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122816</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122816"/>
				<updated>2012-01-16T16:11:03Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122815</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122815"/>
				<updated>2012-01-16T16:09:19Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122814</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122814"/>
				<updated>2012-01-16T16:08:48Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
'''Next Meeting'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122813</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122813"/>
				<updated>2012-01-16T16:00:59Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Rinaldi Rampen]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122812</id>
		<title>Washington DC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC&amp;diff=122812"/>
				<updated>2012-01-16T16:00:45Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
Welcome to the Home Page of the Washington DC OWASP Chapter.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* The chapter Co-Chairs are [mailto:trevor.hawthorn__AT___owasp.org Trevor Hawthorn], and [mailto:rinaldi.rampen__AT__owasp.org Trevor Hawthorn]. Please contact us with any questions about the chapter.&lt;br /&gt;
* Please subscribe to the [http://lists.owasp.org/mailman/listinfo/owasp-washington mailing list] for meeting announcements.&lt;br /&gt;
* You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]&lt;br /&gt;
* Our recent meetings are documented on the News &amp;amp; Meetings tab.&lt;br /&gt;
* You can also check out the archives of this page here [[Washington_DC Archives]].&lt;br /&gt;
&lt;br /&gt;
= Meetings &amp;amp; Events =&lt;br /&gt;
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Participation =&lt;br /&gt;
&lt;br /&gt;
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].&lt;br /&gt;
&lt;br /&gt;
= Twitter =&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; {|&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' &amp;lt;twitter&amp;gt;23609877&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= News &amp;amp; Recent Meetings =&lt;br /&gt;
&lt;br /&gt;
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''December 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''Our last meeting was December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''John Steven''' will speak on '''Assessing your Assessment Practice'''&lt;br /&gt;
* '''Krystal Moon''' and '''Quang Pham''' will speak on '''DHS Software Assurance Pocket Guides'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''John Steven'''&lt;br /&gt;
&lt;br /&gt;
::John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Assessing your Assessment Practice''' - Years ago, organizations embraced Penetration Testing to find vulnerabilities in their applications. Later, vulnerabilities remained and many added a Source Code Review practice, often supported by commercial tooling. Others possess &amp;quot;Holistic Assessment&amp;quot; schemes which combine techniques in hopes of finding an even broader range of vulnerabilities their applications may possess.Years into what most consider maturation, organizations continue to let crippling vulnerability into production despite costly assessment. What's going on?&lt;br /&gt;
&lt;br /&gt;
::In this presentation, we'll consider assessment practices of various shapes and sizes focusing on particularly interesting Fortune 100 companies (assessing 300-1000 apps / year) as well as the single-man-shop. We'll discuss assessment coverage (code and vulnerability), cost, and measures of remediation.&lt;br /&gt;
&lt;br /&gt;
::Next, we'll discuss what methodological, tool-based, measurement, and other techniques can dramatically improve cost, coverage, or successful remediation in your assessment practice.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
:'''Krystal Moon'''&lt;br /&gt;
&lt;br /&gt;
:: Krystal Moon is a Cyber Security Analyst at SRA International, Inc. She currently supports the Department of Homeland Security Software Assurance Program where one of her tasks is co-authoring the Secure Coding Pocket Guide. Previously, she provided certification and accreditation support for various government agencies. She completed her Bachelor of Science in IT with a concentration in Information Security and Master of Science in Applied IT at George Mason Univeristy.&lt;br /&gt;
&lt;br /&gt;
:'''Quang Pham'''&lt;br /&gt;
&lt;br /&gt;
:: Quang Pham is a Cyber Security Analyst at SRA International, INC.  At SRA, Quang is supporting the Department of Homeland Security’s Software Assurance (SwA) program.  One of his roles in the support of the SwA program is to co-author the “Architecture and Design Considerations for Secure Software” Pocket Guide and the “Requirements and Analysis for Secure Software” Pocket Guide.  Quang has a Bachelor’s in Computer Engineering and Electrical Engineering at Penn State and has been at SRA for 9 months.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
::'''Abstract: Software Assurance Pocket Guides''' - The Software Assurance (SwA) Pocket Guide Series comprises free, downloadable documents on software assurance in acquisition and outsourcing, software assurance in development, the software assurance life cycle, and software assurance measurement and information needs. SwA Pocket Guides are developed collaboratively by the SwA Forum and Working Groups, which function as a stakeholder community that welcomes additional participation in advancing and refining software security. The Pocket Guides are offered as informative use only and a good starting point for the relevant practices.&lt;br /&gt;
 &lt;br /&gt;
:::'''Secure Coding'''&lt;br /&gt;
:::Secure coding is a prerequisite for producing robustly secure software. The development of secure software is a complex endeavor and requires a systematic process. The most commonly exploited vulnerabilities are seemingly easily avoided defects in software. Producing secure code is not an absolute science because it depends on a wide range of variables, some of which cannot be easily or accurately measured. Such variables range from the language or platform being used to the nature of the software being developed or the data with which the software is meant to work. This guide does not prescribe answers for all possible situations. Rather, it discusses fundamental practices for secure coding, and lists resources that provide more information about these practices. Using these resources, practitioners can write more secure code for their particular environment.&lt;br /&gt;
 &lt;br /&gt;
:::'''Architecture and Design Considerations for Secure Software'''&lt;br /&gt;
:::The Guide to the Software Engineering Body of Knowledge (SWEBOK) defines the design phase as both &amp;quot;the process of defining the architecture, components, interfaces, and other characteristics of a system or component&amp;quot; and &amp;quot;the result of [that] process.&amp;quot; The software design phase is the software engineering life cycle activity where software requirements are analyzed in order to produce a description of the software’s internal structure that will serve as the basis for its implementation. The software design phase consists of the architectural design and detailed design activities. These activities follow software requirements analysis phase and precedes the software implementation the Software Development Life Cycle (SDLC). This volume of the pocket guide compiles architecture and design software techniques for security and offers guidance on when they should be employed during the SDLC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facility Sponsor: &amp;lt;!-- Currently Open --&amp;gt;Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.bluecanopy.com|logo=BlueCanopySponsoLogo.jpg}}&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is August 24th at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Please '''[http://www.regonline.com/Register/Checkin.aspx?EventID=1003187 REGISTER HERE]''' if you are going to attend so we have an accurate head count.&lt;br /&gt;
* Julian Cohen will speak on '''Cross-Origin Resource Inclusion in HTML5'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speaker'''&lt;br /&gt;
&lt;br /&gt;
:'''Julian Cohen'''&lt;br /&gt;
&lt;br /&gt;
::Julian is a security researcher from New York City.  When he isn't explaining different vulnerability classes to developers, Julian spends his time finding bugs and studying exploitation techniques.  He has previously done information security work for two consulting companies, a defense contractor, a public utility and a handful of web startups, but he still hasn't found the job he's really looking for.&lt;br /&gt;
&lt;br /&gt;
::Julian runs NYU Poly's world-renowned CSAW CTF competition.  In his downtime, Julian writes technical articles for a number of security blogs and participates in CTF competitions around the world.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Cross-Origin Resource Inclusion in HTML5''' - Cross-Origin Resource Inclusion is an HTML5 vulnerability that takes advantage of Cross-Origin Resource Sharing to bypass Same-Site Origin Policy with XMLHttpRequest objects.  This talk will cover Web 2.0 application design trends that allow for this vulnerability to be exploitable.  Basic concepts that are necessary for Cross-Origin Resource Sharing to exist will be covered throughly and w3c specifications will be cited.  An example web application will be used to demonstrate how this functionality is used today, how it can be implemented improperly (and properly) and how it can be exploited by a malicious attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;[http://www.stratumsecurity.com Stratum Security]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 2011 Meeting'''&lt;br /&gt;
&lt;br /&gt;
Our next meeting is July 21st 6:00pm [http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&amp;amp;oe=utf-8 2445 M Street NW Washington, DC 20037] ('''*NOTE NEW LOCATION*''')&lt;br /&gt;
* Please [http://www.regonline.com/Register/Checkin.aspx?EventID=989237 Register Here] &lt;br /&gt;
* Jack Mannino will speak on '''Building Secure Android Applications'''&lt;br /&gt;
* Doug Wilson &amp;amp; Mark Bristow will update on current and upcoming events.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NEW LOCATION'''  Folks will need to come up to the 8th floor, when they get off the elevator, walk towards the concierge, then make a left and walk towards the university room&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
::Jack Mannino is the CEO of nVisium Security, an application security services firm located within the Washington DC area. At nVisium, he provides mobile and web application security services including source code reviews, penetration testing, threat modeling, and training. He is the co-leader and founder of the OWASP Mobile Security Project, which is a global initiative to improve the state of security in the mobile industry. Jack also serves as a board member for the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
::'''Building Secure Android Applications''' - Mobile platforms are gaining momentum as an attacker's favorite new playground. We are seeing huge increases in mobile malware, mobile exploits, and the ever common insecure mobile applications themselves. Mature development shops and startups alike are releasing new applications at the speed of light. Like many other rapidly booming markets, technical innovation is far outpacing the adoption of security best-practices. This is a problem we must solve sooner than later.&lt;br /&gt;
&lt;br /&gt;
::This presentation will highlight many of the new security and privacy challenges developers, organizations, and consumers must be aware of. Android will be our target of interest during this presentation. A threat model for the Android platform will be presented, identifying the various layers where risks are introduced. We will discuss the top mobile security risks and the security controls used to mitigate them using guidance provided by the OWASP Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
::Expect a ton of code samples and live remediation of vulnerabilities. The OWASP GoatDroid project will be used to demonstrate various Android application security flaws. GoatDroid is a fully featured training environment for exploring the attack surface of Android apps. It is highly extendable, and includes several robust RESTful web services.&lt;br /&gt;
&lt;br /&gt;
::At the end of this presentation, attendees will understand how to identify Android risks, how to build secure applications for the Android platform, and will be exposed to the current initiatives within the Mobile Security Project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: Anonymous&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 2010 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be [http://upcoming.yahoo.com/event/5617790/DC/Washington/OWASP-DC-March-Meeting/GWU-Phillips-Hall/ March 24th at 6:30 PM, at 801 22nd Street NW, Room B149] on the GWU campus in Washington DC (*NOTE NEW LOCATION*)&lt;br /&gt;
* Jeff Ennis from Veracode will be presenting on Application Risk Management&lt;br /&gt;
* Dan Philpott will be briefing on the upcoming NIST SP covering Web Application Security&lt;br /&gt;
* Chuck Willis will be giving an update on the OWASP BWA project and releasing and update to BWA&lt;br /&gt;
* Doug Wilson will update on plans for future meetings and upcoming events.&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
'''Jeff Ennis'''&lt;br /&gt;
&lt;br /&gt;
:Jeff Ennis is a Solutions Architect for Veracode, Inc.  He has more than 20 years experience in information technology.  He recently served as Security Solutions Manager for the Federal Division of IBM Internet Security Systems, where he and his team of security architects assisted DoD, Civilian, and Intel agencies with addressing their security requirements as  they dealt with an ever-changing threat landscape..   Throughout his career he has represented both the end user and vendor communities, including Nortel Networks, UUNET, and Lockheed Martin. &lt;br /&gt;
&lt;br /&gt;
:'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
:'''Application Risk Management''' - Application vulnerabilities are steeply on the rise. At $350 billion per year software is the largest manufacturing industry in the world yet there are no uniform standards or insight into security, risk or liability of the final product.  The development environment is becoming increasingly complex – application origin ranges from internally developed code, outsourced, 3rd party, Open Source, and Commercial Off the Shelf software.  Ensuring that these entities are creating secure software is becoming a daunting task.  Lots of emphasis is placed on IT controls, patching, etc, but the new attack vector is your application.  During this presentation we will recap the state of software security today, discuss some initiatives which are requiring application risk management, and provide suggestions on how you can begin managing the application risk at your organization.&lt;br /&gt;
&lt;br /&gt;
'''Dan Philpott'''&lt;br /&gt;
&lt;br /&gt;
:Dan is the maintainer of fismapedia.org, and a recognized expert in IT standards and policy in the DC Metro Area. Dan routinely helps review and contribute to NIST SP and Report documents.&lt;br /&gt;
&lt;br /&gt;
'''Chuck Willis'''&lt;br /&gt;
&lt;br /&gt;
:Chuck is a Technical Director with MANDIANT, and the founder of the OWASP Broken Web Application Project (OWASP BWA). Chuck has presented on the OWASP BWA at AppSecDC 2009 and at DoD Cyber Crime 2010, and will be releasing an updated version of OWASP BWA at this meeting.&lt;br /&gt;
&lt;br /&gt;
'''December 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* Our next meeting will be December 9th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC&lt;br /&gt;
* We will be recapping and discussing AppSecDC and the OWASP Summit&lt;br /&gt;
* We will discuss other recent events such as the DHS Software Assurance Forum Conference&lt;br /&gt;
* We will be talking about the coming year and upcoming events&lt;br /&gt;
* We will open up the floor for discussion of current events or concerns.&lt;br /&gt;
&lt;br /&gt;
'''Addition to Agenda'''&lt;br /&gt;
&lt;br /&gt;
Dan Philpott and several others in and around OWASP DC are working on an OWASP effort to contribute to the NIST draft standard 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems.&lt;br /&gt;
&lt;br /&gt;
After our normal meeting agenda, I am going to turn the space over to Dan, so that he can explain what he and his group are up to, and hold a brief discussion in our space. Any and all who are interested in this process or contributing to government security policy are welcome to stick around and observe or contribute.&lt;br /&gt;
&lt;br /&gt;
'''September 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
* The meeting was held at [http://upcoming.yahoo.com/event/4344425/ September 2nd at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
* Matthew Flick and Jeff Yestrumskas will give an encore of their talk on the Cross-Site Scripting Anonymous Browsers (XAB) that they have previously presented at Black Hat and at Defcon.&lt;br /&gt;
* Doug Wilson talking about the recent launch of the AppSec DC 2009 website, and what's going on with the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''XAB -- The Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year, the Cross-site Scripting Anonymous Browser (“XAB”) was presented at Black Hat DC as a new perspective on how we could extend the functionality of browser technologies, form dynamic botnets for browsing, and create an unpronounceable acronym all at once. We continued the madness with a second incarnation of the XAB framework at Defcon in August.&lt;br /&gt;
&lt;br /&gt;
XAB hasn't really revolutionized attacks or defenses in it's short lifespan, nor is it great at factoring primes. However, it has opened minds by demonstrating an interesting way to combine unlike ideas and creating a new animal all of it's own. Think of it as forced social networking, without ever really knowing who you're talking to, or what they're saying.&lt;br /&gt;
&lt;br /&gt;
During this presentation, we will explain the origins of the concept, provide a brief review of the technologies, pour over the trials and tribulations of the enhancements and additions of the past 6 months, provide a live demonstration of the improvements, and continue the conversation about the future of the framework.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our speakers:'''&lt;br /&gt;
&lt;br /&gt;
'''Matthew Flick, Principal'''&lt;br /&gt;
'''FYRM Associates'''&lt;br /&gt;
&lt;br /&gt;
Matt has more than seven years of professional experience in information assurance focusing in network and application security, assessments, and compliance. He has assessed and helped develop information assurance programs for commercial clients in several industries as well as several Federal agencies.&lt;br /&gt;
&lt;br /&gt;
Matt leads the Information Assurance team at FYRM Associates in delivering consulting services in the areas of application security, assessments, network and wireless security, and security program development. He has performed assessments of many in-house and commercial/third party developed applications, wired and wireless network infrastructures, and complex corporate environments. His primary area of expertise is in application security, which drives much of the focus of FYRM's Information Assurance research and development.&lt;br /&gt;
&lt;br /&gt;
Matt’s other areas of expertise include computer programming, cryptology, and compliance with Federal standards and regulatory compliance, such as FISMA, HIPAA, Sarbanes-Oxley, and PCI-DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jeff Yestrumskas'''&lt;br /&gt;
'''Sr. Manager InfoSec @ Cvent'''&lt;br /&gt;
&lt;br /&gt;
Jeff Yestrumskas is in charge of information security for an international application service provider, but still enjoys getting his hands dirty. His professional background spanning over a decade includes forensics, leading penetration tests, application security services and teaching others to do the same.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 2009 Meeting'''&lt;br /&gt;
&lt;br /&gt;
*The meeting was held at [http://upcoming.yahoo.com/event/4129351/ August 5th at 6:30 PM, at Duques Hall (Room 553D) on the GWU campus in Washington DC]&lt;br /&gt;
*'''Dan Cornell''' of the Denim Group spoke on Vulnerability Management in an Application Security World&lt;br /&gt;
*'''Mike Smith''' of Deloitte spoke on SCAP and how it can relate to web application security.&lt;br /&gt;
*'''Doug Wilson''' gave an update on [[OWASP_AppSec_DC_2009 | AppSecDC 2009]]&lt;br /&gt;
&lt;br /&gt;
About our speakers:&lt;br /&gt;
&lt;br /&gt;
:'''Dan Cornell''' has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
 &lt;br /&gt;
:Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
:'''Vulnerability Management in an Application Security World'''&lt;br /&gt;
&lt;br /&gt;
:This presentation outlines strategies security teams can use for communicating with development teams to manage and ultimately correct application-level vulnerabilities. Similarities and differences between the security practice of vulnerability management and the development practice of defect management are also addressed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Michael Smith''' is a manager in Deloitte's Security and Privacy Practice. His current engagement is as an Information System Security Officer working with a government agency integrating embedded devices with a web application command and control system. He blogs at http://www.guerilla-ciso.com/ and covers security management, public policy, regulations and laws, and technical solutions.&lt;br /&gt;
&lt;br /&gt;
:SCAP is the Security Content Automation Protocol, a set of XML schemas designed to automate information security flows between vulnerability, patch management, and data center automation tools. Michael will be giving us an introduction to SCAP and its applicability to web application security with a call to action to make web application security products and processes compatible with SCAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
We'd like to thank Jon Rose for speaking, and showing us his Deblaze tool in action. His presentation will be up on the wiki shortly. If you want it before then, please email doug.wilson AT owasp for a copy.&lt;br /&gt;
&lt;br /&gt;
Our big announcement of the meeting was that we are kicking off the [[OWASP_AppSec_US_2009_-_Washington_DC| Call for Papers for AppSec DC 2009]], slated for November 10-13 at the DC Convention Center.&lt;br /&gt;
&lt;br /&gt;
We'd also like to thank:&lt;br /&gt;
* George Washington University and their great staff for the meeting space and A/V support&lt;br /&gt;
* Securicon and Mark Bristow for arranging refreshements.&lt;br /&gt;
&lt;br /&gt;
We hope to announce something about our next meeting soon, and if you want to volunteer for the conference, join our [https://lists.owasp.org/mailman/listinfo/appsec_us_09 mailing list]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 22nd 6:30 PM OWASP Meeting, Washington DC&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting will be held in Room 650 D on the 6th floor of Duques Hall at the George Washington University at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month, we will have Jon Rose speaking about Flash Remoting and [http://deblaze-tool.appspot.com/ Deblaze].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Deblaze - A remote method enumeration tool for flex servers.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Flash applications can make request to a remote server to call server side functions, such as looking up accounts, retrieving additional data and graphics, and performing complex business operations. However, the ability to call remote methods also increases the attack surface exposed by these applications.  Deblaze was developed in order to perform method enumeration and interrogation against flash remoting end points.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;This talk will provide a basic overview of Flash remoting and cover some of the security issues found in real-world flash applications and demonstrate a new tool for testing flash applications.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;The latest version can be found at [http://deblaze-tool.appspot.com deblaze-tool.appspot.com]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also discuss the recent [http://www.owasp.org/index.php/OWASP_Software_Assurance_Day_DC_2009 OWASP Software Assurance Day] that took place at Mitre in March, and discuss some of the recent milestones that OWASP has hit with maturing and evolving projects.&lt;br /&gt;
&lt;br /&gt;
We will also have a few copies of the new OWASP Live CD to hand out, first come, first serve.&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on [http://upcoming.yahoo.com/event/2385625/ Upcoming.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6:30 PM OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at The George Washington University in downtown DC.&lt;br /&gt;
&lt;br /&gt;
The meeting is in Duques Hall, Room 553, which is located at [http://maps.google.com/maps?hl=en&amp;amp;q=2201+G+St.+NW+Washington,+DC+20037 2201 G St. NW Washington, DC 20037]&lt;br /&gt;
&lt;br /&gt;
This month's agenda:&lt;br /&gt;
&lt;br /&gt;
* 6:30 - 6:45 Introductions and OWASP Business - Mark Bristow&lt;br /&gt;
* 6:45 - 7:45 WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity - Ryan Barnett&lt;br /&gt;
* 7:45 - 8:00 Break&lt;br /&gt;
* 8:00 - 9:00 Software Assurance Maturity Model (SAMM) - Pravir Chandra&lt;br /&gt;
&lt;br /&gt;
You can RSVP for the event on Upcoming.org: http://upcoming.yahoo.com/event/1494008&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Note on Transportation and Parking''&lt;br /&gt;
&lt;br /&gt;
Parking on campus is at a premium and visitors are encouraged to use public transportation when visiting the campus. The nearest METRO stop, Foggy Bottom/GWU located on the Orange/Blue lines, is a short 3 block walk from the Marvin Center&lt;br /&gt;
&lt;br /&gt;
The Marvin Center Garage operates from 7am - midnight Monday through Friday and is closed on weekends. Make sure you have your car out by 11:45pm. A visitor's parking garage is located between 23rd and 22nd Streets and H and Eye Streets. The visitor entrance is on Eye Street.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December Meeting Debrief'''&lt;br /&gt;
&lt;br /&gt;
I'd like to take this opportunity to once again thank Kevin for coming&lt;br /&gt;
out to talk to us at the meeting Wednesday.  I thought his&lt;br /&gt;
presentation on Samurai, Yokoso!, Laudanum, and Social butterfly&lt;br /&gt;
demonstrated some of the great up and coming tools that are available&lt;br /&gt;
to the community.  As promised, I uploaded the PDF of the presentation&lt;br /&gt;
to the Wiki, but the slides don't do the commentary justice.  It can&lt;br /&gt;
be found [https://www.owasp.org/index.php/Image:OWASP_DC_--_Web_Attack_Tools.pdf here].&lt;br /&gt;
&lt;br /&gt;
We also took care of some housekeeping stuff:&lt;br /&gt;
* We'd like to thank Mike from Deloitte for offering up his space the last few months but our next meeting will instead be held at George Washington University Gelman Library.  Everyone remember to thank Amy for offering up GW's meeting spaces to us.&lt;br /&gt;
* The OWASP DC Chapter will be hosting [https://www.owasp.org/index.php/OWASP_AppSec_US_2009_-_Washington_DC OWASP AppSec 2009] sometime in October 09.  More details will come out as we firm up dates/speakers/locations and calls for volunteers!&lt;br /&gt;
* Rex talked for a few minutes about the Portugal Summit.  The debrief from the summit can be found [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 here] &lt;br /&gt;
* Our next chapter meeting will be held in Feburary, topics TBD but we are [mailto:mark.bristow__AT___owasp.org soliciting speakers].&lt;br /&gt;
&lt;br /&gt;
To those who attended the meeting on Wednesday, thanks for coming out,&lt;br /&gt;
we had a great turnout and I hope to have even more attendees next&lt;br /&gt;
time.  For those who were unable to attend, I hope to see you all at&lt;br /&gt;
our next meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''December 10th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Presentation by Kevin Johnson, InGuardians&lt;br /&gt;
* Round table Discussion of Portugal Summit&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a Senior Security Analyst with InGuardians.  Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and contributes to a large number of open source security projects. Kevin founded and leads the development on B.A.S.E., Samurai, SecTools and Yokoso! projects.&lt;br /&gt;
&lt;br /&gt;
Kevin is an instructor for SANS, authoring and teaching Security 542, Web Application Pen-Testing In-Depth and teaching other SANS classes such as the Incident Handling and Hacker Techniques class. He has presented to many organizations, including InfraGard, ISACA, ISSA and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
You can RSVP to the event on Upcoming.org:&lt;br /&gt;
http://upcoming.yahoo.com/event/1334575&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''October 15th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month's agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Adam Vincent, Hacking and Hardening Web Services&lt;br /&gt;
* Doug Wilson, Report on AppSec NYC 2008&lt;br /&gt;
* Open discussion&lt;br /&gt;
&lt;br /&gt;
Adam Vincent will be presenting on Hacking and Hardening Web Services. He has presented this to other OWASP chapters, including NoVa, and we are pleased to have him be able to bring it to our DC audience.&lt;br /&gt;
&lt;br /&gt;
Doug Wilson will also be reporting back from the OWASP AppSec NYC 2008 conference. He will cover some of the themes that emerged from that, and talk about some of the directions that OWASP is looking to take in the coming year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= History =&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams(at)owasp.org Jeff Williams] and has had members from Virginia to Delaware.&lt;br /&gt;
&lt;br /&gt;
In April 2005 a new chapter, DC-Virginia, was formed and the DC Chapter was renamed to DC-Maryland.&lt;br /&gt;
&lt;br /&gt;
In 2008, the DC-Maryland chapter was given over to the stewardship of co-chairs Rex Booth, Mark Bristow, and Doug Wilson, and charged by the OWASP board to create a chapter focused on the needs of Washington DC in specific. The new chapter has tried to reach out to government and academic environments found in DC as well as the private sector.&lt;br /&gt;
&lt;br /&gt;
The DC chapter will be hosting OWASP AppSec DC in November of 2009, the national OWASP conference for the year.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;paypal&amp;gt;Washington DC&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
September Meeting:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Facility Sponsor: [http://www.livingsocial.com Living Social]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;   Refreshment Sponsor: Still Open!&amp;lt;!-- {{MemberLinks|link=http://www.securicon.com|logo=Securicon.gif}} --&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC_Archives&amp;diff=122811</id>
		<title>Washington DC Archives</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC_Archives&amp;diff=122811"/>
				<updated>2012-01-16T15:58:09Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''August 20th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month, our agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Introduction to OWASP, Rex Booth&lt;br /&gt;
* The Big Picture: Web Risks and Assessments Beyond Scanning, Matt Fisher&lt;br /&gt;
* Security Conference Review: Black Hat &amp;amp; DefCon (group discussion)&lt;br /&gt;
* Open floor&lt;br /&gt;
&lt;br /&gt;
Matt's talk will focus on the need to risk and threat model software and pick appropriate peoples, tools, and testing techniques to test against the threat model. In today's resource-constrained market many organizations are simply turning to automation to test their software security without truly understanding the limitations. This talk will discuss some of the broader threat cases, testing techniques for them, and whether current state of the industry technology is effective against them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''July 23rd 6:30pm OWASP Meeting, Washington DC (Alexandria)'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the Alexandria offices of [http://www.gt.com Grant Thornton] ([http://maps.google.com/maps?q=333+John+Carlyle+Street+Suite+500+Alexandria,+District+of+Columbia+22314+United+States&amp;amp;ie=UTF-8&amp;amp;oe=utf-8 333 John Carlyle Street Suite 500 Alexandria VA]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. If you are late and can not get in, please call 703.785.9390.&lt;br /&gt;
&lt;br /&gt;
The presentation for this meeting will be a reprise of Mark and Doug's [http://onelittlewindow.org/blog/?p=26 Web Application Security and Why It Matters] talk, which was suggested/requested at the last meeting in Alexandria. The presentation will cover the topics of the OWASP Top 10 and include demonstrations of exploits of the Top 5. This is geared towards newcomers to [http://www.owasp.org OWASP], but we hope that all members in the DC Metro area will attend if they have a chance. We also hope to give the DC crowd a &amp;quot;state of the chapter&amp;quot; like we did at the last meeting Columbia, and then open discussion of current events and/or any particular topics of interest will follow.&lt;br /&gt;
&lt;br /&gt;
The presentation can be found [http://onelittlewindow.org/blog/wp-content/uploads/2008/07/webappsec-101-owasp-jul-08.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''June 11th 6:30pm OWASP Meeting, Columbia MD'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting in Columbia MD at Aspect &lt;br /&gt;
Securities offices ([http://maps.google.com/maps?ie=UTF8&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;q=9175+Guilford+Rd,+Columbia,+MD+21046,+USA&amp;amp;ll=39.16855,-76.84413&amp;amp;spn=0.010198,0.018797&amp;amp;z=16&amp;amp;iwloc=addr 9175 Guilford Rd, Ste 300, Columbia, MD 21046]).  The meeting will start at 1830.  If you are late to the meeting and can not get in the door please call 301-604-4882, or hack the door. The meeting will focus on [http://www.aspectsecurity.com/documents/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf HTTP Verb Tampering] and authentication bypass with other topics as we have time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March 20th 6pm OWASP Meeting, Columbia MD'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting in Columbia MD at Aspect &lt;br /&gt;
Securities offices (address below).  The meeting will start at 6pm and &lt;br /&gt;
last to around 9pm or so (depends on the crowd).&lt;br /&gt;
&lt;br /&gt;
The topic for the meeting will be  presentation by Jeff Williams on his &lt;br /&gt;
Enterprise Security API project.  (quick overview below)&lt;br /&gt;
&lt;br /&gt;
   '''Securing Java EE Applications with the OWASP Enterprise Security API (ESAPI)'''&lt;br /&gt;
&lt;br /&gt;
   Jeff Williams, the CEO of Aspect Security and the volunteer Chair of the&lt;br /&gt;
   OWASP Foundation, will present the new OWASP Project he is leading --&lt;br /&gt;
   the OWASP Enterprise Security API (ESAPI). ESAPI is an API and reference&lt;br /&gt;
   implementation designed to make it as easy as possible for web&lt;br /&gt;
   developers to address the most common web application security&lt;br /&gt;
   vulnerabilities, including those discussed in the OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
   ESAPI defines a simple, well-structured, and obvious interface to all&lt;br /&gt;
   the classes and methods a developer needs to build a secure web&lt;br /&gt;
   application, and comes with a reference implementation and over 600 test&lt;br /&gt;
   cases. ESAPI includes numerous new security mechanisms that are simply&lt;br /&gt;
   not present in Java EE today, including intrusion detection!&lt;br /&gt;
   Correctness, completeness, and simplicity are the three primary design&lt;br /&gt;
   goals of ESAPI.&lt;br /&gt;
&lt;br /&gt;
   ESAPI provides a worked example of most security challenges faced by&lt;br /&gt;
   enterprise developers. Developers, architects, and application security&lt;br /&gt;
   specialists can use ESAPI as a baseline for what is expected in their&lt;br /&gt;
   applications. This presentation will cover the basic structure of the&lt;br /&gt;
   API, why using it represents a significant reduction in application&lt;br /&gt;
   security costs, and even why it makes projects more agile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Look forward to seeing everyone there, so dont forget to set your &lt;br /&gt;
outlook/entourage/notes calendars!&lt;br /&gt;
&lt;br /&gt;
Location information:&lt;br /&gt;
&lt;br /&gt;
   Aspect Security, Inc.&lt;br /&gt;
   9175 Guilford Road, Suite 300&lt;br /&gt;
   Columbia, MD 21046-2565&lt;br /&gt;
   Main: 301-604-4882&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6pm Meeting, New Location!'''&lt;br /&gt;
&lt;br /&gt;
This meeting will be held at a new location thanks to a new host [http://www.grantthorton.com Grant Thorton LLP]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presentations&lt;br /&gt;
&lt;br /&gt;
    I will be giving a presentation on the intersection between web &lt;br /&gt;
    application security and the attackers mindset.  The purpose of which is &lt;br /&gt;
    to drill home that web application security isnt just about SQL &lt;br /&gt;
    Injection, XSS, XSRF, and &amp;quot;web application compromises.  My approach &lt;br /&gt;
    will be to outline various methods of abusing web applications to gain a &lt;br /&gt;
    foot holds onto networks as well as leveraging vuln's to &amp;quot;repurpose&amp;quot; &lt;br /&gt;
    existing web applications to the attackers whim.   The ultimate goal of &lt;br /&gt;
    this presentation is to drill home the fact that web applications (and &lt;br /&gt;
    their insecurities) provide an attacker an amazing attack surface to &lt;br /&gt;
    leverage for various purposes, purposes which I will talk about.&lt;br /&gt;
    A few quick highlights include discussions on PHP/ASP* back door shells, &lt;br /&gt;
    PHP based IRC bots, XSS based Attack frameworks, Flash based attack &lt;br /&gt;
    frameworks, IDS evasion etc. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Location details&lt;br /&gt;
&lt;br /&gt;
   Location:&lt;br /&gt;
   333 John Carlyle St&lt;br /&gt;
   Alexandria, VA 22314&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Day After'''&lt;br /&gt;
&lt;br /&gt;
I want to thank everyone who attended as well as the two organizations that made yesterdays LIVE-O mini-con possible.  If it was not for these two organizations the event would not have been nearly as enjoyable as it was. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
      [http://www.honeyclient.org/trac/wiki MITRE HoneyClient Project]&lt;br /&gt;
      [http://www.gt.com Grant Thornton]&lt;br /&gt;
      [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I would also like to thank the presenters who put together the interesting topics and presented them to our chapter. &lt;br /&gt;
&lt;br /&gt;
For all the presentations, notes, and thoughts of the attendee's and presenters you can use the following link. &lt;br /&gt;
&lt;br /&gt;
[[Washington_DC_LIVE-O]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Thursday Sept 6th  LIVE O minicon!!'''&lt;br /&gt;
&lt;br /&gt;
Well it looks like I have been able to finally secure a location for the &lt;br /&gt;
LIVEO mini conference.   The meeting will be held at 1:00pm at MITRE's &lt;br /&gt;
McLean Va Offices in the MITRE 1 Building.  (map to the location below)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you haven't already signed up you must do so ahead of time!  Feel &lt;br /&gt;
free to pass this link around to coworkers or friends who may be &lt;br /&gt;
interested in attending.  Seating is limited to 75 people, and as such &lt;br /&gt;
we will not be able to take any more people once we have reached that &lt;br /&gt;
limit.   If you are not able to come after signing up please use the &lt;br /&gt;
same link to cancel your RSVP for the meeting.  This will free up a seat &lt;br /&gt;
for someone else to enjoy the awe inspiring presentations we have lined &lt;br /&gt;
up.    ;) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
List of presentations&lt;br /&gt;
&lt;br /&gt;
    Honeyclients and Malicious Web Servers  - Kathy Wang - Mitre&lt;br /&gt;
    A malcode perspective on web application privacy - Blake Hartstein - iDefense&lt;br /&gt;
    Practical Web Privacy with Firefox - Chuck Willis- Mandiant&lt;br /&gt;
    A sneak peak at Jeff's new &amp;quot;Enterprise Security API&amp;quot; - Jeff Williams - Aspect Security/OWASP &lt;br /&gt;
    Digital Rights Management - James Stibbards - Cloakware&lt;br /&gt;
&lt;br /&gt;
Please make sure to have your ID with you for checking in when you arrive.&lt;br /&gt;
&lt;br /&gt;
Map/Directions to Mini Con location&lt;br /&gt;
http://www.mitre.org/about/locations/mitre1_map.html &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Thursday August 23rd 6pm Location Aspect Security, Columbia MD'''&lt;br /&gt;
&lt;br /&gt;
I will be giving a presentation outlining some of the various &amp;quot;Rich Interactive Application&amp;quot; (RIA's) Frameworks that are being developed. &lt;br /&gt;
&lt;br /&gt;
Here is the rough draft of the presentation. &lt;br /&gt;
&lt;br /&gt;
Topics to go over&lt;br /&gt;
   (My unofficial plan- YTBD)&lt;br /&gt;
     Offline Web Application frameworks : The fifth horseman?&lt;br /&gt;
           I will be going over the basics of the four major &amp;quot;off line web app frameworks&amp;quot; (aka webocalypse)&lt;br /&gt;
                 Adobe AIR&lt;br /&gt;
                 Google Gears&lt;br /&gt;
                 Microsoft Silverlight&lt;br /&gt;
                 Sun JavaFX&lt;br /&gt;
            Try to go over the differences of each framework, where they fit, and why I think they suck&lt;br /&gt;
            Point out potential weaknesses of each framework&lt;br /&gt;
            Write a group letter to all the developers explaining the coming &amp;quot;webocalypse&amp;quot; (Im joking of course)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Information'''&lt;br /&gt;
&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
&amp;gt;From I-95:&lt;br /&gt;
&lt;br /&gt;
    * Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
    * Take the Broken Land Parkway exit&lt;br /&gt;
    * Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
    * Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Wednesday March 28th 6pm Columbia, MD'''&lt;br /&gt;
&lt;br /&gt;
This meeting will be held at Aspect Security's offices in Columbia MD. The address is below.&lt;br /&gt;
Food:&lt;br /&gt;
As usual, geek food will be provided. This usually means pizza and soda.&lt;br /&gt;
&lt;br /&gt;
Getting there:&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
&amp;gt;From I-95:&lt;br /&gt;
&lt;br /&gt;
    * Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
    * Take the Broken Land Parkway exit&lt;br /&gt;
    * Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
    * Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Meeting: Feburary 15th 6PM'''&lt;br /&gt;
&lt;br /&gt;
Andrew van der stock will be giving a presentation on the following three topics.&lt;br /&gt;
    OWASP Top 10 2007&lt;br /&gt;
    Spring of Code 2007&lt;br /&gt;
    an update on OWASP Guide 3.0 status&lt;br /&gt;
&lt;br /&gt;
Watch this space as it will be updated as the meeting nears.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location information'''&lt;br /&gt;
&lt;br /&gt;
Our hosts have asked that if you are to show up for the meeting that you patiently wait in the first floor lobby for someone to escort you into the conference room that we will be using. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is the address:&lt;br /&gt;
&lt;br /&gt;
[http://www.sra.com/about/index.asp?id=457 SRA Locations]&lt;br /&gt;
&lt;br /&gt;
:Arlington Center (NEW! Opened 7/17/06)&lt;br /&gt;
:3434 Washington Boulevard&lt;br /&gt;
:Arlington, VA  22201-4508&lt;br /&gt;
:Phone:  (703) 284-5000&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting: January 18th 6PM'''&lt;br /&gt;
&lt;br /&gt;
Looks like we will have the following lineup for this months meeting.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be held at Aspect Security's offices in Columbia MD.  The address is below. &lt;br /&gt;
&lt;br /&gt;
#Ed Tracy will be giving a brief presentation on the various Owasp Projects/Products.&lt;br /&gt;
#Jeff Williams will be giving a presentation on the recent PDF vulnerability and his released server side fix for it.&lt;br /&gt;
&lt;br /&gt;
The fix can be found here&lt;br /&gt;
[[http://www.owasp.org/index.php/PDF_Attack_Filter_for_Java_EE]http://www.owasp.org/index.php/PDF_Attack_Filter_for_Java_EE]&lt;br /&gt;
&lt;br /&gt;
There has been plenty of happenings over the last month that should make for an awesome meeting.  Expect to hear about the recent PDF issue!  (with example attacks, snort signatures, server side fixes, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Food:&lt;br /&gt;
&lt;br /&gt;
As usual, geek food will be provided. This usually means pizza and soda.&lt;br /&gt;
&lt;br /&gt;
Getting there&lt;br /&gt;
&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
From I-95:&lt;br /&gt;
&lt;br /&gt;
* Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
* Take the Broken Land Parkway exit&lt;br /&gt;
* Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
* Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 14th Meeting Notes'''&lt;br /&gt;
&lt;br /&gt;
I would again like to thank Eric Pascarello for presenting his Ajax security presentation to our chapter. For those of you who missed the meeting and would still like to see the presentation feel free to grab it from Eric's site below.  I would also like to thank SRA International for providing the facilities and staff to help host the meeting.   Stay tuned for next months meeting!!&lt;br /&gt;
&lt;br /&gt;
[http://www.pascarello.com/Presentation/ http://www.pascarello.com/Presentation/]&lt;br /&gt;
&lt;br /&gt;
 '''Meeting: December 14th 6PM'''&lt;br /&gt;
&lt;br /&gt;
December Meeting Announcement&lt;br /&gt;
&lt;br /&gt;
This OWASP meeting will be held at a new location in Arlington per the chapters request.  Please note that this '''IS NOT''' a permanent shift in venue, but merely an attempt to include those chapter members who are not able to make it to Columbia on a regular basis. &lt;br /&gt;
&lt;br /&gt;
'''Agenda'''&lt;br /&gt;
&lt;br /&gt;
# Opening, introductions&lt;br /&gt;
# Presentation by Eric Pascarello: Investigating JavaScript and Ajax Security&lt;br /&gt;
# Possible &amp;quot;Unannounced&amp;quot; presentation&lt;br /&gt;
# Everything Else: Current Events, OWASP news, Industry News, Recent Hacks in the News, Closing, etc.&lt;br /&gt;
# BoF discussion on AJAX and AJAX security&lt;br /&gt;
&lt;br /&gt;
Dont know who Eric is? Well here is a quick blurb I &amp;quot;liberated&amp;quot; from a website about him.&lt;br /&gt;
&lt;br /&gt;
[http://searchwebservices.techtarget.com/qna/0,289202,sid26_gci1164745,00.html Eric Pascarello dissects Ajax security vulnerabilities]&lt;br /&gt;
&lt;br /&gt;
Eric Pascarello is the co-author of &amp;quot;Ajax in Action&amp;quot; (Manning Publications, October 2005, and the author of &amp;quot;JavaScript: Your Visual Blueprint for Building Dynamic Web Pages&amp;quot;, 2nd Edition (Wiley, October 2004). Pascarello is a 2002 Graduate of Penn State University with a degree in mechanical engineering. He is also a &amp;quot;bartender&amp;quot; on JavaRanch.com. In this interview he talks about Ajax security issues, the need for server-side validation and the Ajax worm released last October on MySpace.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am also trying to work out another presentation that will fit our general &amp;quot;theme&amp;quot; of application security as well. (more details to come!)  And as always I will try to go over the latest and greatest application security news. (think myspace and quicktime)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location information'''&lt;br /&gt;
&lt;br /&gt;
Our hosts have asked that if you are to show up for the meeting that you patiently wait in the first floor lobby for someone to escort you into the conference room that we will be using. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is the address:&lt;br /&gt;
&lt;br /&gt;
[http://www.sra.com/about/index.asp?id=457 SRA Locations]&lt;br /&gt;
&lt;br /&gt;
:Arlington Center (NEW! Opened 7/17/06)&lt;br /&gt;
:3434 Washington Boulevard&lt;br /&gt;
:Arlington, VA  22201-4508&lt;br /&gt;
:Phone:  (703) 284-5000&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting: March 23rd'''&lt;br /&gt;
&lt;br /&gt;
March Meeting Announcement&lt;br /&gt;
&lt;br /&gt;
Our next meeting is on Thursday March 23rd at 1800 hours in the offices of Aspect Security.&lt;br /&gt;
&lt;br /&gt;
This is going to be a technical meeting focusing on AJAX Security.&lt;br /&gt;
&lt;br /&gt;
In case you weren't aware, AJAX is a clever use of existing technologies to provide richer interfaces on the web&lt;br /&gt;
(think Google Maps). It's growing in popularity and &amp;quot;buzz&amp;quot;, so be sure to make this meeting and learn all you can about it.&lt;br /&gt;
&lt;br /&gt;
If you have some AJAX science you'd like to drop on us, then email me directly at mfisher at spidynamics dot com&lt;br /&gt;
&lt;br /&gt;
The Agenda:&lt;br /&gt;
&lt;br /&gt;
# Opening, introductions&lt;br /&gt;
# Presentation by Rick Pries: An introduction to AJAX&lt;br /&gt;
# Overview and Review of the new OWASP AJAX Security Guide&lt;br /&gt;
# BoF discussion on AJAX and AJAX security&lt;br /&gt;
# Everything Else: Current Events, OWASP news, Industry News, Recent Hacks in the News, Closing, etc.&lt;br /&gt;
&lt;br /&gt;
Food:&lt;br /&gt;
&lt;br /&gt;
As usual, geek food will be provided. This usually means pizza and soda.&lt;br /&gt;
&lt;br /&gt;
Getting there&lt;br /&gt;
&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
From I-95:&lt;br /&gt;
&lt;br /&gt;
* Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
* Take the Broken Land Parkway exit&lt;br /&gt;
* Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
* Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
Unfortunately being out in the far 'burbs there is very limited public transport.&lt;br /&gt;
 &lt;br /&gt;
If you need help getting to the meeting, try emailing the list and asking for a lift.&lt;br /&gt;
&lt;br /&gt;
There are two MARC stations within a twenty minute drive, and the MTA contracted commuter busses drop off within 2 miles of the  &lt;br /&gt;
offices.&lt;br /&gt;
&lt;br /&gt;
Wireless:&lt;br /&gt;
&lt;br /&gt;
I am please to announce that we may just have wireless access for the meeting. No promises, but if you're the type who likes to&lt;br /&gt;
look stuff up realtime then you may want to bring the laptop.&lt;br /&gt;
&lt;br /&gt;
If we *are* lucky to enough to get wireless access, there will be a serious &amp;quot;no playing around&amp;quot; policy in place, and anyone &lt;br /&gt;
breaking it will be kick/banned for life, y'all hear ?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December Meeting Notes'''&lt;br /&gt;
&lt;br /&gt;
[Note: there was no meeting in November due to the holiday crunch. We decided to hold just one meeting in December].&lt;br /&gt;
&lt;br /&gt;
Greetings from the Northern side of the Beltway. I wanted to send out a note to everyone letting them know how great the meeting&lt;br /&gt;
was last night. The turn out was the perfect size for some &amp;quot;fireside chats&amp;quot;.... It was some of the most technical conversation&lt;br /&gt;
I've had in a long time that didn't involve an instant messenging client.&lt;br /&gt;
&lt;br /&gt;
First of all, Thanks again to the ever-generous Aspect Security whom provided not only meeting space, but pizza and a chaperone as  &lt;br /&gt;
well. I'm glad to say that Chuck was there too .. Chuck is one of our most highly technical meetings, and shows up every time, on  &lt;br /&gt;
time.&lt;br /&gt;
&lt;br /&gt;
For those of you who didn't make it, here's what we discussed. Note that I said *discussed*; not presentations. The smaller size of &lt;br /&gt;
this meeting really afforded some great technical conversation and the loose interactive format was spectacular. If you missed it , &lt;br /&gt;
well then you missed out.&lt;br /&gt;
&lt;br /&gt;
# Susan Suskin gave us her thoughts on the AppSec conference for those you who missed the conference. Apparently the majority of the conference rocked, except for some lam3r presentation on web application worms (mine) .&lt;br /&gt;
# NIST's SAMATE project. This is a government funded project that attempts to a) gain serious expertise in app sec to the point of being able to 2) define key performance capabilities of app sec tools, 3) define metrics for those capabilities, 4) create test environments against those metrics, and then 5) evaluate and report on all app sec tools. Discussion of this spun off of the discussion of the conference.&lt;br /&gt;
# **The recent GMail hack**. This was really well done (props Andre ) . Instead of doing a *presentation* on it, shots from the original 'explanation' site was passed around and we all deciphered it together, making a true learning and discussion opportunity. Unfortunately this also mitigated our ability to mock his lamer slides, but I secretly mocked his lamer xeroxing capabilities. I'm just kidding of course: Andre xerox's like a champ. I think he's certified in it or something.&lt;br /&gt;
# **A Tutorial Walk-Through of SQL Injection and Blind SQL Injection** along with *nasty evasive destructive SQL Injections*, followed by the Web App Sec comedy hour. Those of you who missed the AppSec conference and also missed the meeting last night missed all the humour. Plus, you'll never understand how astute Donald Rumsfeld is with input validation. [ If you   this far, then you get an extra slice of pizza next meeting ]. My next presentation will be stone-cold serious, but equally lame. My presentations should improve once I finish my PowerPoint certification study class.&lt;br /&gt;
# ShmooCon ! The coolest conference you'll find in the area. Be there are be square. http://www.shmoocon.org/ If you are already registered for the conference and aren't staying at the Wardman, , then please consider booking a room - they need this to lock in the hotel for next year. I'm local, and I have a room !&lt;br /&gt;
# **AJAX** - what it is, what is isn't, who's using it, how it works, and the security implications of it. We all agreed that none of us know enough about it and we're looking for someone with some real expertise to educate us on it. I for one am willing to chip in some bucks for a serious education on it. If we all chipped in, we may be able to get someone to give us a couple hours of tutorial on it. Thoughts ?&lt;br /&gt;
&lt;br /&gt;
Next Meeting:&lt;br /&gt;
&lt;br /&gt;
For our next gig, we're trying to get none other than a Special Agent from the Federal Bureau of Investigations to talk to us about  &lt;br /&gt;
the real world legal and prosecutorial environment in relations to cyber intrusions. We will also discuss the latest and greatest &lt;br /&gt;
hacks, vulns and exploit techniques.&lt;br /&gt;
&lt;br /&gt;
We'd like to see if there's a way to get internet access for the attendees as well. For instance, last night we really could have &lt;br /&gt;
used a Spanish L33t to English L33t Dictionary while deciphering the Gmail hack. It would be great for doing quick googles, demo's  &lt;br /&gt;
etc. If there are any ideas on how we could secure some wireless that would not place us on the host's network, then please bring it. Netstumbling the office doesn't count.&lt;br /&gt;
&lt;br /&gt;
So now you know, and knowing's half the battle.&lt;br /&gt;
&lt;br /&gt;
- Matt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Tuesday October 25th OWASP Meeting Agenda'''&lt;br /&gt;
&lt;br /&gt;
The next OWASP DC chapter meeting will be held Tuesday, October 25th at 6pm. The meeting will be held in Aspect Security's office&lt;br /&gt;
in Columbia MD.&lt;br /&gt;
&lt;br /&gt;
: Aspect Security, Inc.&lt;br /&gt;
: 9175 Guilford Road, Suite 300&lt;br /&gt;
: Columbia, MD 21046-2565&lt;br /&gt;
: Main: 301-604-4882&lt;br /&gt;
: Fax: 443.583.0772&lt;br /&gt;
&lt;br /&gt;
Directions: http://www.aspectsecurity.com/contact.html&lt;br /&gt;
&lt;br /&gt;
Meeting Agenda&lt;br /&gt;
 &lt;br /&gt;
6:00pm – Initial Meeting kickoff&lt;br /&gt;
6:30pm – Special Guest Presentation (Steve Elky, see below for more information)&lt;br /&gt;
7:15pm – Pizza / General Discussion&lt;br /&gt;
7:30pm – Discussion on AppSecDC 2005 (Jeff Williams will be presenting)&lt;br /&gt;
8:15pm – Discussion on Myspace.com “worm”&lt;br /&gt;
&lt;br /&gt;
Special Guest Presentation&lt;br /&gt;
&lt;br /&gt;
This week we have a special guest speaker Steve Elky. Steve will be discussing the incorporation of security and Certification and  &lt;br /&gt;
Accreditation into the Software Development Life Cycle. A brief overview of the presentation is below.&lt;br /&gt;
 &lt;br /&gt;
Certification and accreditation (C&amp;amp;A) mandate&lt;br /&gt;
Certification&lt;br /&gt;
Accreditation&lt;br /&gt;
C&amp;amp;A and the Software Development Life Cycle (SDLC)&lt;br /&gt;
Initiation&lt;br /&gt;
Development/Acquisition&lt;br /&gt;
Implementation&lt;br /&gt;
Operations/Maintenance&lt;br /&gt;
Disposal&lt;br /&gt;
Key Roles&lt;br /&gt;
Independent Approach to C&amp;amp;A&lt;br /&gt;
Integrated Approach to C&amp;amp;A&lt;br /&gt;
&lt;br /&gt;
About Steve Elky&lt;br /&gt;
&lt;br /&gt;
Steve Elky is the Technical Director for Information Security at Software Performance Systems, a software company specializing in  &lt;br /&gt;
e-government solutions. Mr. Elky has his CISSP, CISM, ISSAP, ISSMP, MCSE, CNE, GCNT, CCNA and CCSA as well as a B.S. from the &lt;br /&gt;
University of Baltimore. Mr. Elky acts as a security advisor to various company clients as well as helping company developers &lt;br /&gt;
determine and meet security requirements. Mr. Elky is currently assisting the Library of Congress in the design and implementation &lt;br /&gt;
of their security program.&lt;br /&gt;
&lt;br /&gt;
Discussion and review of AppSecDC 2005&lt;br /&gt;
&lt;br /&gt;
Jeff Williams will be reviewing and discussing the happenings of AppSecDC 2005 for those of us who were not able to attend the &lt;br /&gt;
conference.&lt;br /&gt;
&lt;br /&gt;
Discussion on Myspace.com “worm”&lt;br /&gt;
&lt;br /&gt;
If time permits we will be reviewing the recent myspace.com “worm”, both at a technical level as well as a higher level conceptual &lt;br /&gt;
view including “what if” scenarios.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Next Meeting - Tuesday, September 27 @6pm'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our monthly chapter meeting. It's held on the fourth Tuesday of each month at 6pm. If you have any &lt;br /&gt;
items you'd like others to talk about, or if you'd like to make a presentation, post your ideas to our [http://lists.sourceforge.net/lists/listinfo/owasp-washington/ mailing list].&lt;br /&gt;
&lt;br /&gt;
OWASP DC-Maryland Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project, DC-Maryland Chapter holds meetings on the fourth Tuesday of each month.&lt;br /&gt;
&lt;br /&gt;
LOCATION:&lt;br /&gt;
&lt;br /&gt;
[http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
[http://maps.google.com/maps?q=9770+Patuxent+Woods+Drive,Columbia,+MD&amp;amp;ll=39.178528,-76.850980&amp;amp;spn=0.030334,0.056793&amp;amp;hl=en 9770 Patuxent Woods Drive]&lt;br /&gt;
[http://maps.google.com/maps?q=9770+Patuxent+Woods+Drive,Columbia,+MD&amp;amp;ll=39.178528,-76.850980&amp;amp;spn=0.030334,0.056793&amp;amp;hl=en Columbia, MD]&lt;br /&gt;
(Meeting may be in rear building, 9780.)&lt;br /&gt;
&lt;br /&gt;
AGENDA:&lt;br /&gt;
&lt;br /&gt;
The agenda for this month's meeting is:&lt;br /&gt;
&lt;br /&gt;
:* Meet &amp;amp; Greet(6pm)&lt;br /&gt;
:* PIZZA&lt;br /&gt;
:* Group Presentation (7pm)&lt;br /&gt;
:** Jeff Williams presents the OWASP Guide 2.0&lt;br /&gt;
:* Top Ten feedback survey - Help us test the survey before it's used at the October OWASP conference.&lt;br /&gt;
&lt;br /&gt;
See you there!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 7/19/05'''&lt;br /&gt;
&lt;br /&gt;
At the July 19th meeting, the DC-Maryland chapter took on the topic of the &amp;quot;broken top-ten&amp;quot;. We spent 2 and a half hours and digressed many times. Often getting lost in the weeds. We did have some useful ideas (I do apologize to the rest of the chapter as these thoughts are largely influenced by my opinions -ed tracy).&lt;br /&gt;
&lt;br /&gt;
After discussing the problems with the many uses of the top ten, we asked what does the industry need. The industry needs awareness &lt;br /&gt;
and guidance. These are two different things. We will admit it has been great for awareness, aka marketing. And, a concern of &lt;br /&gt;
changing the top ten is given: a radical change in the top ten is likely to diminish its reputation and its effectiveness at raising &lt;br /&gt;
awareness.&lt;br /&gt;
&lt;br /&gt;
Now back to guidance (the other thing the industry needs)...The top ten is being used for education, security review checklist, &lt;br /&gt;
design/implementation guide, etc. Well, the industry needs these things in very concise form. We should give them that. OWASP&lt;br /&gt;
should produce these (I know some of it's been produced al y). These shouldn't be top tens or marketed as top tens, as ten is not &lt;br /&gt;
going to cover everything and having ten top-tens is silly.&lt;br /&gt;
&lt;br /&gt;
The key is to put a big disclaimer in The top ten that advises people not to use it for review checklist, design guide, etc. The  &lt;br /&gt;
disclaimer should go on to point people in the right direction for guidance for&lt;br /&gt;
each of those tasks. We believe the top ten should warn people that it's not fit for those other tasks. Otherwise, they think it is &lt;br /&gt;
and that creates &amp;quot;FUD.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Training Session Notes - 6/7/05'''&lt;br /&gt;
&lt;br /&gt;
We held a training session for web app security in early June. About 15 people trickled in at all hours.&lt;br /&gt;
&lt;br /&gt;
Thanks Aspect Security, for providing installation CDs with WebGoat, WebScarab, and Paros.&lt;br /&gt;
&lt;br /&gt;
As a group, we did some of the WebGoat exercises using the WebScarab application proxy.&lt;br /&gt;
&lt;br /&gt;
Thanks to Chuck for demonstrating bean scripting in WebScarab. It's used to automate testing.&lt;br /&gt;
&lt;br /&gt;
Thanks to Matt Fisher for demonstrating Spi Dynamics' WebInspect and its web proxy capabilities.&lt;br /&gt;
&lt;br /&gt;
The session was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
: 9770 Patuxent Woods Drive&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 5/24/05'''&lt;br /&gt;
&lt;br /&gt;
Thanks to Weilin Zhong for running this meeting.&lt;br /&gt;
&lt;br /&gt;
Weilin led a discussion about security for Web Services. As of mid-august, someone is still trying to sanitize the presentation she  &lt;br /&gt;
gave so that it can be published here.&lt;br /&gt;
&lt;br /&gt;
The meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
: 9770 Patuxent Woods Drive&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 4/26/05'''&lt;br /&gt;
&lt;br /&gt;
Thanks to Bruce Potter for discussing a comparison of secure development on different operating systems.&lt;br /&gt;
&lt;br /&gt;
:* App Sec News&lt;br /&gt;
:** Sorry, this month's notes are lost.&lt;br /&gt;
&lt;br /&gt;
The meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
: 9770 Patuxent Woods Drive&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 3/22/05'''&lt;br /&gt;
&lt;br /&gt;
Thanks again to Aspect for providing pizza!&lt;br /&gt;
&lt;br /&gt;
:* App Sec News&lt;br /&gt;
:** SHA-1 defrocked (http://www.financialcryptography.com/mt/archives/000355.html)&lt;br /&gt;
:** XSS Proxy tool described by Andre Ludwig (http://xss-proxy.sourceforge.net/Advanced_XSS_Control.txt)&lt;br /&gt;
:*** Takes XSS vulnerability and exploits the hell out of it&lt;br /&gt;
:*** Potential demonstration in the future&lt;br /&gt;
:* Ethics Discussion&lt;br /&gt;
:** Harvard applicants rejected for &amp;quot;hacking&amp;quot; application website (http://www.pcworld.com/news/article/0,aid,119938,00.asp)&lt;br /&gt;
:*** Everyone was surprised at the many different opinions of culpability people had&lt;br /&gt;
:**Vulnerability Sharing Clubs like this one: http://www.immunitysec.com/services-sharing.shtml&lt;br /&gt;
:* Chapter Direction Discussion, Presentation Ideas&lt;br /&gt;
:** Are we advancing webappsec, teaching it, or both? Possible worksessions at future meetings to allow both to coexist&lt;br /&gt;
:** Inno Eroraha suggested cross-polinating with other focus groups in the DC area, ideas?&lt;br /&gt;
:** Andre Ludwig suggested a demo on the XSS Proxy tool, dates?&lt;br /&gt;
:** Matt Fisher suggested revisiting the Secure Model Architecture discussion, volunteers to get this started?&lt;br /&gt;
:** Matt Fisher suggested Absinthe and other SQL testing tools demonstration, dates?&lt;br /&gt;
:** Joe Bui suggested an outreach session held in DC to reach the government audience. Joe is checking for space availability at his office downtown.&lt;br /&gt;
:** Several people suggested having a Northern VA meeting. That was countered with the idea of an additional chapter. If someone in VA (or any other area near DC) would like to move one of our meetings to VA, please let me know. I think it's a good idea.&lt;br /&gt;
:* Penetration Testing Lab&lt;br /&gt;
:** Introduced the OWASP Penetration Testing Checklist (http://www.owasp.org/documentation/testing/application.html)&lt;br /&gt;
:** Introduced WebScarab (http://www.owasp.org/software/webscarab.html)&lt;br /&gt;
:** Introduced WebGoat (http://www.owasp.org/software/webgoat.html)&lt;br /&gt;
:** Gil Prine and Jeff Williams recommended the book, &amp;quot;Innocent Code&amp;quot; by Sverre H. Huseby&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 2/22/05'''&lt;br /&gt;
&lt;br /&gt;
No meeting this month due to chapter organizers being out of town. See you next month!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 1/25/05'''&lt;br /&gt;
&lt;br /&gt;
This month's meeting saw our biggest turnout yet, with over 20 attendees. Thanks to everyone for coming, thanks to&lt;br /&gt;
[mailto:dave.wichers@owasp.org Dave Wichers] for his presentation, and thanks to Aspect for providing pizza, soda and snacks!&lt;br /&gt;
&lt;br /&gt;
WebScarab and WebGoat presentation by Dave Wichers&lt;br /&gt;
&lt;br /&gt;
:* [http://www2.owasp.org/index.php/OWASP_WebScarab_Project WebScarab], written by [mailto:rogan@users.sourceforge.net Rogan Dawes] and donated to OWASP, has been around about five years in one form or another (please let Rogan know if you use it!)&lt;br /&gt;
:* Current version at http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61823&lt;br /&gt;
:* Includes a man-in-the-middle proxy, HTTP request/response editor, filtering traffic logger, session ID analyzer, passive web spider, automatic response modifier, encoder/decoder/hasher, and more; it’s also scriptable with Java Beanshell&lt;br /&gt;
:* Dave took us through several of the [http://www2.owasp.org/index.php/OWASP_WebGoat_Project WebGoat] lessons using WebScarab to manipulate traffic and explained common vulnerabilities like cross-site scripting&lt;br /&gt;
:* We were showed how to use WebScarab to intercept browser requests and change it before sending it to the server&lt;br /&gt;
:* Discussed some authentication and session management methods such as HTTP Basic Auth (bad), Tomcat JSESSIONID (good), using SSL only for the login (bad), etc.&lt;br /&gt;
:* WebScarab will point out which pages on your site set cookies&lt;br /&gt;
:* It will show you both raw and formatted HTTP requests and responses and show you a hex editor-like view of binary data such as images&lt;br /&gt;
&lt;br /&gt;
General Discussion&lt;br /&gt;
&lt;br /&gt;
:* Discussed the dilemma of accidentally finding a vulnerability on a public site...do you disclose or not? Will they think you’re a cracker or a saint...or just ignore you?&lt;br /&gt;
:* Discussed what other tools people use, commercial and free: Appscan, WebInspect, Sleuth, Nstealth, Achilles, Odysseus, Paros, etc. Some limited use of both the commercial and free scanning tools was identified.&lt;br /&gt;
:* Discussed web application &amp;quot;firewalls&amp;quot;. No one in the group indicated they were using any of these products.&lt;br /&gt;
:* DISA has a checklist for application security (called the Application Security Checklist) at: http://csrc.nist.gov/pcig/cig.html, and NIST is working on the FISMA guidelines, but until there’s a federal regulation on secure development it will be hard to convince them to (pay to) do it&lt;br /&gt;
:* Discussed the conundrum of developers having no motivation to think security; mentioned putting security requirements in the business/software requirements; mentioned the OWASP secure software contract annex (http://www.owasp.org/docroot/owasp/misc/contract.doc)&lt;br /&gt;
:* Discussed the new application code scanning tools, Ounce Lab's Prexis, Fortfy, and Klocwork were all mentioned. Some members had received briefings on them but no significant use was discussed.&lt;br /&gt;
:**Since the meeting, some articles about these tools have been identified and are included here for reference:&lt;br /&gt;
:*** Here's a recent (Jan 2005) article about Fortify: http://www.infoworld.com/article/05/01/14/03TCfortify_1.html&lt;br /&gt;
:*** Here's an older (Jul 2004) article about a previous release of Ounce's Prexis: http://www.sdtimes.com/news/106/story12.htm&lt;br /&gt;
:*** A summary of mostly open source application security code analysis tools is available here: http://sardonix.org/Auditing_Resources.html&lt;br /&gt;
:*** A general article about the emerging web app security capabilities: &amp;quot;Emerging web app security services and products bring source code vulnerabilities to light&amp;quot; http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss467_art975,00.html &lt;br /&gt;
:*** And in the same Information Security mag article is a summary chart of various product and service vendors in the space: http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss467_art978,00.html&lt;br /&gt;
:*** The Vendors' pages for these products are at:&lt;br /&gt;
:::: http://www.ouncelabs.com/prexis_engine.html&lt;br /&gt;
:::: http://www.fortifysoftware.com/products/suite/&lt;br /&gt;
:::: http://www.klocwork.com/products/inspect.asp&lt;br /&gt;
&lt;br /&gt;
Note: OWASP is not endorsing these products in any way. This information is simply provided for the interest of the members of &lt;br /&gt;
the DC Chapter.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 12/28/04'''&lt;br /&gt;
&lt;br /&gt;
No meeting this month due to the holidays. Happy holidays!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 11/23/04'''&lt;br /&gt;
&lt;br /&gt;
This month's meeting was again held in the first floor conference room at [http://www.aspectsecurity.com Aspect Security], the &lt;br /&gt;
chapter's sponsor. A couple &amp;quot;regulars&amp;quot; couldn't make it due to the holiday but it was still well-attended.&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Future meetings will continue to be on the fourth Tuesday of the month--so the next meeting will be on December 28, &lt;br /&gt;
again at 6pm. As long as Aspect can reserve the conference room for us, we'll continue meeting there.&lt;br /&gt;
&lt;br /&gt;
Minutes: A slightly smaller group allowed us to keep discussion on topic more easily this month.&lt;br /&gt;
&lt;br /&gt;
:* GEMS Demo: Demonstration of the insecurity of Diebold's General Election Management System (GEMS). See http://www.equalccw.com/dieboldtestnotes.html for more details.&lt;br /&gt;
:* DropMyRights: Discussed use of dropmyrights.exe when you're running as administrator but want to run your email and browser          with lower privileges. Just create a shortcut that contains &amp;quot;C:\Program Files\dropmyrights\DropMyRights.exe&amp;quot; &amp;quot;C:\Program Files\Internet Explorer\iexplore.exe&amp;quot; and use that instead of directly invoking the browser. See http://msdn.microsoft.com/security/securecode/columns/default.aspx?pull=/library/en-us/dncode/html/secure11152004.asp for the tool and a short article.&lt;br /&gt;
:* OWASP Secure Software Contract Annex: Jeff Williams prepared a draft of this document as a starting point for helping people write software development contracts that include security. We discussed how this contract emphasizes the lifecycle steps, whereas the Ounce Labs version emphasizes specific vulnerabilities. We also discussed the fact that the contract includes &amp;quot;requirements for the requirements&amp;quot; instead of trying to cover everything. The document needs more work on the &amp;quot;teeth,&amp;quot; i.e. how to ensure that each element is specific enough to audit. Also, it needs some more work on including risk-related activities before the requirements. The plan is to incorporate a few comments, get approval from the OWASP-Leaders, send it out to [http://www.securityfocus.com/archive/107 WebAppSec] and stand up an OWASP project to maintain the document.&lt;br /&gt;
:** The OWASP Mission: The contract discussion led into questions about OWASP's constituency and how we are serving them. One view is that OWASP serves developers and the contract effort is not exactly on target. The other view we discussed is that OWASP is focused on the problem of insecure software, and it should do whatever is necessary to raise awareness of the issue. We also discussed OWASP's role as a platform for the application security community. Is OWASP an &amp;quot;if you build it, they will come&amp;quot; model?&lt;br /&gt;
:** Open Letter and Requirements Project: We discussed the Open Letter and how it looks like the various product vendors will be working with OWASP to produce a strong list of requirements for all of web application security.&lt;br /&gt;
:* Reference Architectures: We discussed the concept for this project again, and examined Microsoft's Improving Web Application Security (http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnnetsec/html/threatcounter.asp). While an impressive effort, it seems like there is a need for platform independent documentation that covers the threat, requirements, and architecture levels, but doesn't go into the source code level.&lt;br /&gt;
:* J2EE Filters: Jeff gave a bit of background on how J2EE Filters works. Anil pointed out that this is very similar to how HTTP Handlers work in the .NET environment. We then discussed the types of things that J2EE Filters can do. Jeff showed how to write filters that implement a request rate throttle, an input sanitizer, a certificate validator, an SSL-only verifier, and several other functions. Some ideas raised by the group included a logging filter and a filter to verify that responses with set-cookie headers should only be sent over SSL.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 10/28/04'''&lt;br /&gt;
&lt;br /&gt;
This month we decided to meet in a conference room at [http://www.aspectsecurity.com Aspect Security], the chapter's sponsor. Aspect &lt;br /&gt;
was generous enough to provide sodas, chips, and the most delicious brownies anyone ever tasted. Thanks!&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Future meetings will be on the fourth Tuesday of the month--so the next meeting will be on November 23, again at 6pm. As &lt;br /&gt;
long as Aspect can reserve the conference room for us, we'll meet there again.&lt;br /&gt;
&lt;br /&gt;
Minutes: We tried to keep the discussion on three main topics: whitepaper topics, a concept for a &amp;quot;webappsec dashboard,&amp;quot; and J2EE &lt;br /&gt;
filters.&lt;br /&gt;
&lt;br /&gt;
:* Whitepaper topics: Jeff has a list of subjects he'd really like to   whitepapers about, but doesn't have time to write about himself. If anyone would like to volunteer to write a whitepaper to be posted on the OWASP site, [mailto:jeff.williams@owasp.org email Jeff]. Some of the topics that sparked a lot of discussion and interest were:&lt;br /&gt;
:** The asymmetric/broken market for security: Consumers can't determine if software is secure so they won't pay more for the claim of security; producers can't charge more for more secure software so they don't make it more secure. How do we get vendors to write secure code? How about for libraries--are the circumstances different? A related but possibly separate topic is, who has the burden of proof--the developer to prove software's secure, or the consumer to prove it's insecure?&lt;br /&gt;
:** Secure web app architectures: How do you draw security or secure web app architectures? We're not so good at telling customers where to do security things in the data flow and n-tier diagrams. Can we do this with UML? Data flow diagrams? How about a &amp;quot;reference architecture&amp;quot; for authentication as an example? This may turn out to be a Chapter project.&lt;br /&gt;
:** How to decide what to fix first: Is there a quick and easy way for a company with a large number of web apps to determine where they should begin with assessments? If they don't know about any vulnerabilities in any sites, which do they look at first? Maybe we can come up with a short questionnaire for each web app to risk rank them relatively, in the style of The [http://www.joelonsoftware.com/articles/fog0000000043.html Joel Test]. This may also become a Chapter project.&lt;br /&gt;
:** Mechanisms, vulnerabilities, and threat models: How do people threat-model attacks? Do they even do it? Could we create a standard suite of threat models for any generic web app?&lt;br /&gt;
:** Webappsec requirements: Are people putting security requirements into their business requirements for projects involving web apps? Can we create a standard list of security requirements people can paste in to their project docs?&lt;br /&gt;
:* Webappsec dashboard: The concern is that CISOs have no way to get their arms around the state of web app security in their environment. They need a sort of dashboard where they can see metrics and statistics about all their web apps all in one place. Something like this may have to be a tool/software, and OWASP really isn't in the business of writing tools/software.&lt;br /&gt;
:* J2EE filters: We didn't have time to discuss this but attendees were interested so it will be on the agenda for the next meeting. Jeff quickly demonstrated a tool to analyze JAR files and show what calls they make.&lt;br /&gt;
:* General discussion: More and more Local Chapters are springing up--what kinds of things can chapters contribute? What should they be expected to contribute?&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 9/30/04'''&lt;br /&gt;
&lt;br /&gt;
A good time was had by all.&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Future meetings will be on the last Thursday of the month--so the next meeting will be on October 28, again at 6pm. If &lt;br /&gt;
anyone has a good suggestion about where to meet, please send it to the [http://lists.sourceforge.net/lists/listinfo/owasp-washington/list list].&lt;br /&gt;
&lt;br /&gt;
Minutes: None recorded.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.rockyrun.com/locations.htm Rocky Run Tap &amp;amp; Grill]&lt;br /&gt;
: 6480 Dobbin Center Way&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 8/25/04'''&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who showed up last night to the first OWASP Washington Local Chapter meeting. It was great to finally put some &lt;br /&gt;
faces to names, meet some local application security folks, and the Guinness was nice too!&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Meetings will be on the last Wednesday of the month--so the next meeting will be on September 29, again at 6pm. This time &lt;br /&gt;
we're going to meet in Columbia, MD at a place to be determined soon. If anyone has a good suggestion about where to meet, please &lt;br /&gt;
send it to the list.&lt;br /&gt;
&lt;br /&gt;
Minutes: We had some wide-ranging discussions that touched on scanning, brute-force attacks, validation, web app firewalls, and new &lt;br /&gt;
projects for OWASP.&lt;br /&gt;
&lt;br /&gt;
:* Brute force attacks: We discussed some schemes for handling brute force attacks on websites, some techniques for making a site hard to scan (and why some scanners don't care), and we discussed the combinatorics of generating productive password lists. We  also got a demo of Matt Fisher's password generation utility.&lt;br /&gt;
:* OWASP and awareness: We had a long discussion about things that OWASP can do to help raise awareness about web application security. Some promising approaches included making some webinars and offering them on the website, and providing more practical stuff (tools, libraries, templates) and not focusing on the academic.&lt;br /&gt;
:* OWASP image: We discussed some ways that OWASP could build on the &amp;quot;platform&amp;quot; provided by the new portal. We could move the webappsec list to OWASP from sourceforge, maybe create some different lists (newbie, advanced, SQL injection, etc.). We could  create some discussion forums.&lt;br /&gt;
:* Metrics: We talked about the new metrics project and what kinds of metrics would be the most useful to the appsec community.&lt;br /&gt;
:* Promoting adoption: There were some interesting ideas about things OWASP could do to advance the adoption of good appsec practices. One was to get some buy-in from the FBI (a la SANS) or another high-power agency. Matt Chalmers and Chris Burton are going to pursue a few leads to see if there's interest.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.mayorgaimports.com/html/retail-silverspring.php Mayorga Cafe]&lt;br /&gt;
: 8040 Georgia Av&lt;br /&gt;
: Silver Spring, MD&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Washington_DC_Archives&amp;diff=122810</id>
		<title>Washington DC Archives</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Washington_DC_Archives&amp;diff=122810"/>
				<updated>2012-01-16T15:56:54Z</updated>
		
		<summary type="html">&lt;p&gt;Trevor.Hawthorn: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''December 21st 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
'''Our [https://www.regonline.com/owaspdcdecember2011 next meeting] is December 21st at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&amp;amp;hl=en&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=44.204685,93.076172&amp;amp;z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Refreshments will be served starting at 6:30 PM, with the presentation starting around 7.&amp;lt;br&amp;gt;&lt;br /&gt;
This location is very close to both the McPherson Square and Metro Center WMATA train stations.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages &lt;br /&gt;
* '''Ken Johnson''' and (maybe) '''Chris Gates''' will speak on the '''New Features in the Web Exploitation Framework (wXf)'''&lt;br /&gt;
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About our Speakers'''&lt;br /&gt;
&lt;br /&gt;
:'''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:'''Chris Gates'''&lt;br /&gt;
&lt;br /&gt;
::TBD&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
::'''Abstract: Updates in wXf''' - Coming Soon&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''August 20th 6:30pm OWASP Meeting, Washington DC'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the DC offices of [http://www.deloitte.com/ Deloitte &amp;amp; Touche] ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1001+G+ST+NW+washington+dc 1001 G St NW Washington DC 20001]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. Upon arriving, please go to the 9th floor and sign in, someone will escort you to the meeting location, Rm. 8S026. If you are late and can not get in, please call 202.270.8715.&lt;br /&gt;
&lt;br /&gt;
This month, our agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
* Introduction to OWASP, Rex Booth&lt;br /&gt;
* The Big Picture: Web Risks and Assessments Beyond Scanning, Matt Fisher&lt;br /&gt;
* Security Conference Review: Black Hat &amp;amp; DefCon (group discussion)&lt;br /&gt;
* Open floor&lt;br /&gt;
&lt;br /&gt;
Matt's talk will focus on the need to risk and threat model software and pick appropriate peoples, tools, and testing techniques to test against the threat model. In today's resource-constrained market many organizations are simply turning to automation to test their software security without truly understanding the limitations. This talk will discuss some of the broader threat cases, testing techniques for them, and whether current state of the industry technology is effective against them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''July 23rd 6:30pm OWASP Meeting, Washington DC (Alexandria)'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting at the Alexandria offices of [http://www.gt.com Grant Thornton] ([http://maps.google.com/maps?q=333+John+Carlyle+Street+Suite+500+Alexandria,+District+of+Columbia+22314+United+States&amp;amp;ie=UTF-8&amp;amp;oe=utf-8 333 John Carlyle Street Suite 500 Alexandria VA]).&lt;br /&gt;
&lt;br /&gt;
The meeting will start at 1830. If you are late and can not get in, please call 703.785.9390.&lt;br /&gt;
&lt;br /&gt;
The presentation for this meeting will be a reprise of Mark and Doug's [http://onelittlewindow.org/blog/?p=26 Web Application Security and Why It Matters] talk, which was suggested/requested at the last meeting in Alexandria. The presentation will cover the topics of the OWASP Top 10 and include demonstrations of exploits of the Top 5. This is geared towards newcomers to [http://www.owasp.org OWASP], but we hope that all members in the DC Metro area will attend if they have a chance. We also hope to give the DC crowd a &amp;quot;state of the chapter&amp;quot; like we did at the last meeting Columbia, and then open discussion of current events and/or any particular topics of interest will follow.&lt;br /&gt;
&lt;br /&gt;
The presentation can be found [http://onelittlewindow.org/blog/wp-content/uploads/2008/07/webappsec-101-owasp-jul-08.pdf here].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''June 11th 6:30pm OWASP Meeting, Columbia MD'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting in Columbia MD at Aspect &lt;br /&gt;
Securities offices ([http://maps.google.com/maps?ie=UTF8&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;q=9175+Guilford+Rd,+Columbia,+MD+21046,+USA&amp;amp;ll=39.16855,-76.84413&amp;amp;spn=0.010198,0.018797&amp;amp;z=16&amp;amp;iwloc=addr 9175 Guilford Rd, Ste 300, Columbia, MD 21046]).  The meeting will start at 1830.  If you are late to the meeting and can not get in the door please call 301-604-4882, or hack the door. The meeting will focus on [http://www.aspectsecurity.com/documents/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf HTTP Verb Tampering] and authentication bypass with other topics as we have time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March 20th 6pm OWASP Meeting, Columbia MD'''&lt;br /&gt;
&lt;br /&gt;
This month we will be holding our meeting in Columbia MD at Aspect &lt;br /&gt;
Securities offices (address below).  The meeting will start at 6pm and &lt;br /&gt;
last to around 9pm or so (depends on the crowd).&lt;br /&gt;
&lt;br /&gt;
The topic for the meeting will be  presentation by Jeff Williams on his &lt;br /&gt;
Enterprise Security API project.  (quick overview below)&lt;br /&gt;
&lt;br /&gt;
   '''Securing Java EE Applications with the OWASP Enterprise Security API (ESAPI)'''&lt;br /&gt;
&lt;br /&gt;
   Jeff Williams, the CEO of Aspect Security and the volunteer Chair of the&lt;br /&gt;
   OWASP Foundation, will present the new OWASP Project he is leading --&lt;br /&gt;
   the OWASP Enterprise Security API (ESAPI). ESAPI is an API and reference&lt;br /&gt;
   implementation designed to make it as easy as possible for web&lt;br /&gt;
   developers to address the most common web application security&lt;br /&gt;
   vulnerabilities, including those discussed in the OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
   ESAPI defines a simple, well-structured, and obvious interface to all&lt;br /&gt;
   the classes and methods a developer needs to build a secure web&lt;br /&gt;
   application, and comes with a reference implementation and over 600 test&lt;br /&gt;
   cases. ESAPI includes numerous new security mechanisms that are simply&lt;br /&gt;
   not present in Java EE today, including intrusion detection!&lt;br /&gt;
   Correctness, completeness, and simplicity are the three primary design&lt;br /&gt;
   goals of ESAPI.&lt;br /&gt;
&lt;br /&gt;
   ESAPI provides a worked example of most security challenges faced by&lt;br /&gt;
   enterprise developers. Developers, architects, and application security&lt;br /&gt;
   specialists can use ESAPI as a baseline for what is expected in their&lt;br /&gt;
   applications. This presentation will cover the basic structure of the&lt;br /&gt;
   API, why using it represents a significant reduction in application&lt;br /&gt;
   security costs, and even why it makes projects more agile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Look forward to seeing everyone there, so dont forget to set your &lt;br /&gt;
outlook/entourage/notes calendars!&lt;br /&gt;
&lt;br /&gt;
Location information:&lt;br /&gt;
&lt;br /&gt;
   Aspect Security, Inc.&lt;br /&gt;
   9175 Guilford Road, Suite 300&lt;br /&gt;
   Columbia, MD 21046-2565&lt;br /&gt;
   Main: 301-604-4882&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''February 5th 6pm Meeting, New Location!'''&lt;br /&gt;
&lt;br /&gt;
This meeting will be held at a new location thanks to a new host [http://www.grantthorton.com Grant Thorton LLP]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presentations&lt;br /&gt;
&lt;br /&gt;
    I will be giving a presentation on the intersection between web &lt;br /&gt;
    application security and the attackers mindset.  The purpose of which is &lt;br /&gt;
    to drill home that web application security isnt just about SQL &lt;br /&gt;
    Injection, XSS, XSRF, and &amp;quot;web application compromises.  My approach &lt;br /&gt;
    will be to outline various methods of abusing web applications to gain a &lt;br /&gt;
    foot holds onto networks as well as leveraging vuln's to &amp;quot;repurpose&amp;quot; &lt;br /&gt;
    existing web applications to the attackers whim.   The ultimate goal of &lt;br /&gt;
    this presentation is to drill home the fact that web applications (and &lt;br /&gt;
    their insecurities) provide an attacker an amazing attack surface to &lt;br /&gt;
    leverage for various purposes, purposes which I will talk about.&lt;br /&gt;
    A few quick highlights include discussions on PHP/ASP* back door shells, &lt;br /&gt;
    PHP based IRC bots, XSS based Attack frameworks, Flash based attack &lt;br /&gt;
    frameworks, IDS evasion etc. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Location details&lt;br /&gt;
&lt;br /&gt;
   Location:&lt;br /&gt;
   333 John Carlyle St&lt;br /&gt;
   Alexandria, VA 22314&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Day After'''&lt;br /&gt;
&lt;br /&gt;
I want to thank everyone who attended as well as the two organizations that made yesterdays LIVE-O mini-con possible.  If it was not for these two organizations the event would not have been nearly as enjoyable as it was. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
      [http://www.honeyclient.org/trac/wiki MITRE HoneyClient Project]&lt;br /&gt;
      [http://www.gt.com Grant Thornton]&lt;br /&gt;
      [http://www.aspectsecurity.com/ Aspect Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I would also like to thank the presenters who put together the interesting topics and presented them to our chapter. &lt;br /&gt;
&lt;br /&gt;
For all the presentations, notes, and thoughts of the attendee's and presenters you can use the following link. &lt;br /&gt;
&lt;br /&gt;
[[Washington_DC_LIVE-O]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Thursday Sept 6th  LIVE O minicon!!'''&lt;br /&gt;
&lt;br /&gt;
Well it looks like I have been able to finally secure a location for the &lt;br /&gt;
LIVEO mini conference.   The meeting will be held at 1:00pm at MITRE's &lt;br /&gt;
McLean Va Offices in the MITRE 1 Building.  (map to the location below)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you haven't already signed up you must do so ahead of time!  Feel &lt;br /&gt;
free to pass this link around to coworkers or friends who may be &lt;br /&gt;
interested in attending.  Seating is limited to 75 people, and as such &lt;br /&gt;
we will not be able to take any more people once we have reached that &lt;br /&gt;
limit.   If you are not able to come after signing up please use the &lt;br /&gt;
same link to cancel your RSVP for the meeting.  This will free up a seat &lt;br /&gt;
for someone else to enjoy the awe inspiring presentations we have lined &lt;br /&gt;
up.    ;) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
List of presentations&lt;br /&gt;
&lt;br /&gt;
    Honeyclients and Malicious Web Servers  - Kathy Wang - Mitre&lt;br /&gt;
    A malcode perspective on web application privacy - Blake Hartstein - iDefense&lt;br /&gt;
    Practical Web Privacy with Firefox - Chuck Willis- Mandiant&lt;br /&gt;
    A sneak peak at Jeff's new &amp;quot;Enterprise Security API&amp;quot; - Jeff Williams - Aspect Security/OWASP &lt;br /&gt;
    Digital Rights Management - James Stibbards - Cloakware&lt;br /&gt;
&lt;br /&gt;
Please make sure to have your ID with you for checking in when you arrive.&lt;br /&gt;
&lt;br /&gt;
Map/Directions to Mini Con location&lt;br /&gt;
http://www.mitre.org/about/locations/mitre1_map.html &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Thursday August 23rd 6pm Location Aspect Security, Columbia MD'''&lt;br /&gt;
&lt;br /&gt;
I will be giving a presentation outlining some of the various &amp;quot;Rich Interactive Application&amp;quot; (RIA's) Frameworks that are being developed. &lt;br /&gt;
&lt;br /&gt;
Here is the rough draft of the presentation. &lt;br /&gt;
&lt;br /&gt;
Topics to go over&lt;br /&gt;
   (My unofficial plan- YTBD)&lt;br /&gt;
     Offline Web Application frameworks : The fifth horseman?&lt;br /&gt;
           I will be going over the basics of the four major &amp;quot;off line web app frameworks&amp;quot; (aka webocalypse)&lt;br /&gt;
                 Adobe AIR&lt;br /&gt;
                 Google Gears&lt;br /&gt;
                 Microsoft Silverlight&lt;br /&gt;
                 Sun JavaFX&lt;br /&gt;
            Try to go over the differences of each framework, where they fit, and why I think they suck&lt;br /&gt;
            Point out potential weaknesses of each framework&lt;br /&gt;
            Write a group letter to all the developers explaining the coming &amp;quot;webocalypse&amp;quot; (Im joking of course)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location Information'''&lt;br /&gt;
&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
&amp;gt;From I-95:&lt;br /&gt;
&lt;br /&gt;
    * Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
    * Take the Broken Land Parkway exit&lt;br /&gt;
    * Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
    * Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Wednesday March 28th 6pm Columbia, MD'''&lt;br /&gt;
&lt;br /&gt;
This meeting will be held at Aspect Security's offices in Columbia MD. The address is below.&lt;br /&gt;
Food:&lt;br /&gt;
As usual, geek food will be provided. This usually means pizza and soda.&lt;br /&gt;
&lt;br /&gt;
Getting there:&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
&amp;gt;From I-95:&lt;br /&gt;
&lt;br /&gt;
    * Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
    * Take the Broken Land Parkway exit&lt;br /&gt;
    * Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
    * Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Meeting: Feburary 15th 6PM'''&lt;br /&gt;
&lt;br /&gt;
Andrew van der stock will be giving a presentation on the following three topics.&lt;br /&gt;
    OWASP Top 10 2007&lt;br /&gt;
    Spring of Code 2007&lt;br /&gt;
    an update on OWASP Guide 3.0 status&lt;br /&gt;
&lt;br /&gt;
Watch this space as it will be updated as the meeting nears.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location information'''&lt;br /&gt;
&lt;br /&gt;
Our hosts have asked that if you are to show up for the meeting that you patiently wait in the first floor lobby for someone to escort you into the conference room that we will be using. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is the address:&lt;br /&gt;
&lt;br /&gt;
[http://www.sra.com/about/index.asp?id=457 SRA Locations]&lt;br /&gt;
&lt;br /&gt;
:Arlington Center (NEW! Opened 7/17/06)&lt;br /&gt;
:3434 Washington Boulevard&lt;br /&gt;
:Arlington, VA  22201-4508&lt;br /&gt;
:Phone:  (703) 284-5000&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting: January 18th 6PM'''&lt;br /&gt;
&lt;br /&gt;
Looks like we will have the following lineup for this months meeting.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be held at Aspect Security's offices in Columbia MD.  The address is below. &lt;br /&gt;
&lt;br /&gt;
#Ed Tracy will be giving a brief presentation on the various Owasp Projects/Products.&lt;br /&gt;
#Jeff Williams will be giving a presentation on the recent PDF vulnerability and his released server side fix for it.&lt;br /&gt;
&lt;br /&gt;
The fix can be found here&lt;br /&gt;
[[http://www.owasp.org/index.php/PDF_Attack_Filter_for_Java_EE]http://www.owasp.org/index.php/PDF_Attack_Filter_for_Java_EE]&lt;br /&gt;
&lt;br /&gt;
There has been plenty of happenings over the last month that should make for an awesome meeting.  Expect to hear about the recent PDF issue!  (with example attacks, snort signatures, server side fixes, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Food:&lt;br /&gt;
&lt;br /&gt;
As usual, geek food will be provided. This usually means pizza and soda.&lt;br /&gt;
&lt;br /&gt;
Getting there&lt;br /&gt;
&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
From I-95:&lt;br /&gt;
&lt;br /&gt;
* Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
* Take the Broken Land Parkway exit&lt;br /&gt;
* Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
* Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 14th Meeting Notes'''&lt;br /&gt;
&lt;br /&gt;
I would again like to thank Eric Pascarello for presenting his Ajax security presentation to our chapter. For those of you who missed the meeting and would still like to see the presentation feel free to grab it from Eric's site below.  I would also like to thank SRA International for providing the facilities and staff to help host the meeting.   Stay tuned for next months meeting!!&lt;br /&gt;
&lt;br /&gt;
[http://www.pascarello.com/Presentation/ http://www.pascarello.com/Presentation/]&lt;br /&gt;
&lt;br /&gt;
 '''Meeting: December 14th 6PM'''&lt;br /&gt;
&lt;br /&gt;
December Meeting Announcement&lt;br /&gt;
&lt;br /&gt;
This OWASP meeting will be held at a new location in Arlington per the chapters request.  Please note that this '''IS NOT''' a permanent shift in venue, but merely an attempt to include those chapter members who are not able to make it to Columbia on a regular basis. &lt;br /&gt;
&lt;br /&gt;
'''Agenda'''&lt;br /&gt;
&lt;br /&gt;
# Opening, introductions&lt;br /&gt;
# Presentation by Eric Pascarello: Investigating JavaScript and Ajax Security&lt;br /&gt;
# Possible &amp;quot;Unannounced&amp;quot; presentation&lt;br /&gt;
# Everything Else: Current Events, OWASP news, Industry News, Recent Hacks in the News, Closing, etc.&lt;br /&gt;
# BoF discussion on AJAX and AJAX security&lt;br /&gt;
&lt;br /&gt;
Dont know who Eric is? Well here is a quick blurb I &amp;quot;liberated&amp;quot; from a website about him.&lt;br /&gt;
&lt;br /&gt;
[http://searchwebservices.techtarget.com/qna/0,289202,sid26_gci1164745,00.html Eric Pascarello dissects Ajax security vulnerabilities]&lt;br /&gt;
&lt;br /&gt;
Eric Pascarello is the co-author of &amp;quot;Ajax in Action&amp;quot; (Manning Publications, October 2005, and the author of &amp;quot;JavaScript: Your Visual Blueprint for Building Dynamic Web Pages&amp;quot;, 2nd Edition (Wiley, October 2004). Pascarello is a 2002 Graduate of Penn State University with a degree in mechanical engineering. He is also a &amp;quot;bartender&amp;quot; on JavaRanch.com. In this interview he talks about Ajax security issues, the need for server-side validation and the Ajax worm released last October on MySpace.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am also trying to work out another presentation that will fit our general &amp;quot;theme&amp;quot; of application security as well. (more details to come!)  And as always I will try to go over the latest and greatest application security news. (think myspace and quicktime)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location information'''&lt;br /&gt;
&lt;br /&gt;
Our hosts have asked that if you are to show up for the meeting that you patiently wait in the first floor lobby for someone to escort you into the conference room that we will be using. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is the address:&lt;br /&gt;
&lt;br /&gt;
[http://www.sra.com/about/index.asp?id=457 SRA Locations]&lt;br /&gt;
&lt;br /&gt;
:Arlington Center (NEW! Opened 7/17/06)&lt;br /&gt;
:3434 Washington Boulevard&lt;br /&gt;
:Arlington, VA  22201-4508&lt;br /&gt;
:Phone:  (703) 284-5000&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting: March 23rd'''&lt;br /&gt;
&lt;br /&gt;
March Meeting Announcement&lt;br /&gt;
&lt;br /&gt;
Our next meeting is on Thursday March 23rd at 1800 hours in the offices of Aspect Security.&lt;br /&gt;
&lt;br /&gt;
This is going to be a technical meeting focusing on AJAX Security.&lt;br /&gt;
&lt;br /&gt;
In case you weren't aware, AJAX is a clever use of existing technologies to provide richer interfaces on the web&lt;br /&gt;
(think Google Maps). It's growing in popularity and &amp;quot;buzz&amp;quot;, so be sure to make this meeting and learn all you can about it.&lt;br /&gt;
&lt;br /&gt;
If you have some AJAX science you'd like to drop on us, then email me directly at mfisher at spidynamics dot com&lt;br /&gt;
&lt;br /&gt;
The Agenda:&lt;br /&gt;
&lt;br /&gt;
# Opening, introductions&lt;br /&gt;
# Presentation by Rick Pries: An introduction to AJAX&lt;br /&gt;
# Overview and Review of the new OWASP AJAX Security Guide&lt;br /&gt;
# BoF discussion on AJAX and AJAX security&lt;br /&gt;
# Everything Else: Current Events, OWASP news, Industry News, Recent Hacks in the News, Closing, etc.&lt;br /&gt;
&lt;br /&gt;
Food:&lt;br /&gt;
&lt;br /&gt;
As usual, geek food will be provided. This usually means pizza and soda.&lt;br /&gt;
&lt;br /&gt;
Getting there&lt;br /&gt;
&lt;br /&gt;
Aspect is located at 9175 Guilford Road (Suite 300) in Columbia. Driving directions are:&lt;br /&gt;
&lt;br /&gt;
From I-95:&lt;br /&gt;
&lt;br /&gt;
* Exit 38 B : Rt. 32 West towards Columbia (1.5 miles)&lt;br /&gt;
* Take the Broken Land Parkway exit&lt;br /&gt;
* Turn left off the ramp onto Broken Land Parkway&lt;br /&gt;
* Turn left at the light onto Guilford Road (0.5 miles)&lt;br /&gt;
&lt;br /&gt;
After a sharp left, enter the parking lot at 9175 Guilford Road. [Note: if you go under the bridge, you've gone too far]&lt;br /&gt;
&lt;br /&gt;
We're on the third floor in Suite 300&lt;br /&gt;
&lt;br /&gt;
Unfortunately being out in the far 'burbs there is very limited public transport.&lt;br /&gt;
 &lt;br /&gt;
If you need help getting to the meeting, try emailing the list and asking for a lift.&lt;br /&gt;
&lt;br /&gt;
There are two MARC stations within a twenty minute drive, and the MTA contracted commuter busses drop off within 2 miles of the  &lt;br /&gt;
offices.&lt;br /&gt;
&lt;br /&gt;
Wireless:&lt;br /&gt;
&lt;br /&gt;
I am please to announce that we may just have wireless access for the meeting. No promises, but if you're the type who likes to&lt;br /&gt;
look stuff up realtime then you may want to bring the laptop.&lt;br /&gt;
&lt;br /&gt;
If we *are* lucky to enough to get wireless access, there will be a serious &amp;quot;no playing around&amp;quot; policy in place, and anyone &lt;br /&gt;
breaking it will be kick/banned for life, y'all hear ?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December Meeting Notes'''&lt;br /&gt;
&lt;br /&gt;
[Note: there was no meeting in November due to the holiday crunch. We decided to hold just one meeting in December].&lt;br /&gt;
&lt;br /&gt;
Greetings from the Northern side of the Beltway. I wanted to send out a note to everyone letting them know how great the meeting&lt;br /&gt;
was last night. The turn out was the perfect size for some &amp;quot;fireside chats&amp;quot;.... It was some of the most technical conversation&lt;br /&gt;
I've had in a long time that didn't involve an instant messenging client.&lt;br /&gt;
&lt;br /&gt;
First of all, Thanks again to the ever-generous Aspect Security whom provided not only meeting space, but pizza and a chaperone as  &lt;br /&gt;
well. I'm glad to say that Chuck was there too .. Chuck is one of our most highly technical meetings, and shows up every time, on  &lt;br /&gt;
time.&lt;br /&gt;
&lt;br /&gt;
For those of you who didn't make it, here's what we discussed. Note that I said *discussed*; not presentations. The smaller size of &lt;br /&gt;
this meeting really afforded some great technical conversation and the loose interactive format was spectacular. If you missed it , &lt;br /&gt;
well then you missed out.&lt;br /&gt;
&lt;br /&gt;
# Susan Suskin gave us her thoughts on the AppSec conference for those you who missed the conference. Apparently the majority of the conference rocked, except for some lam3r presentation on web application worms (mine) .&lt;br /&gt;
# NIST's SAMATE project. This is a government funded project that attempts to a) gain serious expertise in app sec to the point of being able to 2) define key performance capabilities of app sec tools, 3) define metrics for those capabilities, 4) create test environments against those metrics, and then 5) evaluate and report on all app sec tools. Discussion of this spun off of the discussion of the conference.&lt;br /&gt;
# **The recent GMail hack**. This was really well done (props Andre ) . Instead of doing a *presentation* on it, shots from the original 'explanation' site was passed around and we all deciphered it together, making a true learning and discussion opportunity. Unfortunately this also mitigated our ability to mock his lamer slides, but I secretly mocked his lamer xeroxing capabilities. I'm just kidding of course: Andre xerox's like a champ. I think he's certified in it or something.&lt;br /&gt;
# **A Tutorial Walk-Through of SQL Injection and Blind SQL Injection** along with *nasty evasive destructive SQL Injections*, followed by the Web App Sec comedy hour. Those of you who missed the AppSec conference and also missed the meeting last night missed all the humour. Plus, you'll never understand how astute Donald Rumsfeld is with input validation. [ If you   this far, then you get an extra slice of pizza next meeting ]. My next presentation will be stone-cold serious, but equally lame. My presentations should improve once I finish my PowerPoint certification study class.&lt;br /&gt;
# ShmooCon ! The coolest conference you'll find in the area. Be there are be square. http://www.shmoocon.org/ If you are already registered for the conference and aren't staying at the Wardman, , then please consider booking a room - they need this to lock in the hotel for next year. I'm local, and I have a room !&lt;br /&gt;
# **AJAX** - what it is, what is isn't, who's using it, how it works, and the security implications of it. We all agreed that none of us know enough about it and we're looking for someone with some real expertise to educate us on it. I for one am willing to chip in some bucks for a serious education on it. If we all chipped in, we may be able to get someone to give us a couple hours of tutorial on it. Thoughts ?&lt;br /&gt;
&lt;br /&gt;
Next Meeting:&lt;br /&gt;
&lt;br /&gt;
For our next gig, we're trying to get none other than a Special Agent from the Federal Bureau of Investigations to talk to us about  &lt;br /&gt;
the real world legal and prosecutorial environment in relations to cyber intrusions. We will also discuss the latest and greatest &lt;br /&gt;
hacks, vulns and exploit techniques.&lt;br /&gt;
&lt;br /&gt;
We'd like to see if there's a way to get internet access for the attendees as well. For instance, last night we really could have &lt;br /&gt;
used a Spanish L33t to English L33t Dictionary while deciphering the Gmail hack. It would be great for doing quick googles, demo's  &lt;br /&gt;
etc. If there are any ideas on how we could secure some wireless that would not place us on the host's network, then please bring it. Netstumbling the office doesn't count.&lt;br /&gt;
&lt;br /&gt;
So now you know, and knowing's half the battle.&lt;br /&gt;
&lt;br /&gt;
- Matt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Tuesday October 25th OWASP Meeting Agenda'''&lt;br /&gt;
&lt;br /&gt;
The next OWASP DC chapter meeting will be held Tuesday, October 25th at 6pm. The meeting will be held in Aspect Security's office&lt;br /&gt;
in Columbia MD.&lt;br /&gt;
&lt;br /&gt;
: Aspect Security, Inc.&lt;br /&gt;
: 9175 Guilford Road, Suite 300&lt;br /&gt;
: Columbia, MD 21046-2565&lt;br /&gt;
: Main: 301-604-4882&lt;br /&gt;
: Fax: 443.583.0772&lt;br /&gt;
&lt;br /&gt;
Directions: http://www.aspectsecurity.com/contact.html&lt;br /&gt;
&lt;br /&gt;
Meeting Agenda&lt;br /&gt;
 &lt;br /&gt;
6:00pm – Initial Meeting kickoff&lt;br /&gt;
6:30pm – Special Guest Presentation (Steve Elky, see below for more information)&lt;br /&gt;
7:15pm – Pizza / General Discussion&lt;br /&gt;
7:30pm – Discussion on AppSecDC 2005 (Jeff Williams will be presenting)&lt;br /&gt;
8:15pm – Discussion on Myspace.com “worm”&lt;br /&gt;
&lt;br /&gt;
Special Guest Presentation&lt;br /&gt;
&lt;br /&gt;
This week we have a special guest speaker Steve Elky. Steve will be discussing the incorporation of security and Certification and  &lt;br /&gt;
Accreditation into the Software Development Life Cycle. A brief overview of the presentation is below.&lt;br /&gt;
 &lt;br /&gt;
Certification and accreditation (C&amp;amp;A) mandate&lt;br /&gt;
Certification&lt;br /&gt;
Accreditation&lt;br /&gt;
C&amp;amp;A and the Software Development Life Cycle (SDLC)&lt;br /&gt;
Initiation&lt;br /&gt;
Development/Acquisition&lt;br /&gt;
Implementation&lt;br /&gt;
Operations/Maintenance&lt;br /&gt;
Disposal&lt;br /&gt;
Key Roles&lt;br /&gt;
Independent Approach to C&amp;amp;A&lt;br /&gt;
Integrated Approach to C&amp;amp;A&lt;br /&gt;
&lt;br /&gt;
About Steve Elky&lt;br /&gt;
&lt;br /&gt;
Steve Elky is the Technical Director for Information Security at Software Performance Systems, a software company specializing in  &lt;br /&gt;
e-government solutions. Mr. Elky has his CISSP, CISM, ISSAP, ISSMP, MCSE, CNE, GCNT, CCNA and CCSA as well as a B.S. from the &lt;br /&gt;
University of Baltimore. Mr. Elky acts as a security advisor to various company clients as well as helping company developers &lt;br /&gt;
determine and meet security requirements. Mr. Elky is currently assisting the Library of Congress in the design and implementation &lt;br /&gt;
of their security program.&lt;br /&gt;
&lt;br /&gt;
Discussion and review of AppSecDC 2005&lt;br /&gt;
&lt;br /&gt;
Jeff Williams will be reviewing and discussing the happenings of AppSecDC 2005 for those of us who were not able to attend the &lt;br /&gt;
conference.&lt;br /&gt;
&lt;br /&gt;
Discussion on Myspace.com “worm”&lt;br /&gt;
&lt;br /&gt;
If time permits we will be reviewing the recent myspace.com “worm”, both at a technical level as well as a higher level conceptual &lt;br /&gt;
view including “what if” scenarios.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Next Meeting - Tuesday, September 27 @6pm'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our monthly chapter meeting. It's held on the fourth Tuesday of each month at 6pm. If you have any &lt;br /&gt;
items you'd like others to talk about, or if you'd like to make a presentation, post your ideas to our [http://lists.sourceforge.net/lists/listinfo/owasp-washington/ mailing list].&lt;br /&gt;
&lt;br /&gt;
OWASP DC-Maryland Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project, DC-Maryland Chapter holds meetings on the fourth Tuesday of each month.&lt;br /&gt;
&lt;br /&gt;
LOCATION:&lt;br /&gt;
&lt;br /&gt;
[http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
[http://maps.google.com/maps?q=9770+Patuxent+Woods+Drive,Columbia,+MD&amp;amp;ll=39.178528,-76.850980&amp;amp;spn=0.030334,0.056793&amp;amp;hl=en 9770 Patuxent Woods Drive]&lt;br /&gt;
[http://maps.google.com/maps?q=9770+Patuxent+Woods+Drive,Columbia,+MD&amp;amp;ll=39.178528,-76.850980&amp;amp;spn=0.030334,0.056793&amp;amp;hl=en Columbia, MD]&lt;br /&gt;
(Meeting may be in rear building, 9780.)&lt;br /&gt;
&lt;br /&gt;
AGENDA:&lt;br /&gt;
&lt;br /&gt;
The agenda for this month's meeting is:&lt;br /&gt;
&lt;br /&gt;
:* Meet &amp;amp; Greet(6pm)&lt;br /&gt;
:* PIZZA&lt;br /&gt;
:* Group Presentation (7pm)&lt;br /&gt;
:** Jeff Williams presents the OWASP Guide 2.0&lt;br /&gt;
:* Top Ten feedback survey - Help us test the survey before it's used at the October OWASP conference.&lt;br /&gt;
&lt;br /&gt;
See you there!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 7/19/05'''&lt;br /&gt;
&lt;br /&gt;
At the July 19th meeting, the DC-Maryland chapter took on the topic of the &amp;quot;broken top-ten&amp;quot;. We spent 2 and a half hours and digressed many times. Often getting lost in the weeds. We did have some useful ideas (I do apologize to the rest of the chapter as these thoughts are largely influenced by my opinions -ed tracy).&lt;br /&gt;
&lt;br /&gt;
After discussing the problems with the many uses of the top ten, we asked what does the industry need. The industry needs awareness &lt;br /&gt;
and guidance. These are two different things. We will admit it has been great for awareness, aka marketing. And, a concern of &lt;br /&gt;
changing the top ten is given: a radical change in the top ten is likely to diminish its reputation and its effectiveness at raising &lt;br /&gt;
awareness.&lt;br /&gt;
&lt;br /&gt;
Now back to guidance (the other thing the industry needs)...The top ten is being used for education, security review checklist, &lt;br /&gt;
design/implementation guide, etc. Well, the industry needs these things in very concise form. We should give them that. OWASP&lt;br /&gt;
should produce these (I know some of it's been produced al y). These shouldn't be top tens or marketed as top tens, as ten is not &lt;br /&gt;
going to cover everything and having ten top-tens is silly.&lt;br /&gt;
&lt;br /&gt;
The key is to put a big disclaimer in The top ten that advises people not to use it for review checklist, design guide, etc. The  &lt;br /&gt;
disclaimer should go on to point people in the right direction for guidance for&lt;br /&gt;
each of those tasks. We believe the top ten should warn people that it's not fit for those other tasks. Otherwise, they think it is &lt;br /&gt;
and that creates &amp;quot;FUD.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Training Session Notes - 6/7/05'''&lt;br /&gt;
&lt;br /&gt;
We held a training session for web app security in early June. About 15 people trickled in at all hours.&lt;br /&gt;
&lt;br /&gt;
Thanks Aspect Security, for providing installation CDs with WebGoat, WebScarab, and Paros.&lt;br /&gt;
&lt;br /&gt;
As a group, we did some of the WebGoat exercises using the WebScarab application proxy.&lt;br /&gt;
&lt;br /&gt;
Thanks to Chuck for demonstrating bean scripting in WebScarab. It's used to automate testing.&lt;br /&gt;
&lt;br /&gt;
Thanks to Matt Fisher for demonstrating Spi Dynamics' WebInspect and its web proxy capabilities.&lt;br /&gt;
&lt;br /&gt;
The session was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
: 9770 Patuxent Woods Drive&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 5/24/05'''&lt;br /&gt;
&lt;br /&gt;
Thanks to Weilin Zhong for running this meeting.&lt;br /&gt;
&lt;br /&gt;
Weilin led a discussion about security for Web Services. As of mid-august, someone is still trying to sanitize the presentation she  &lt;br /&gt;
gave so that it can be published here.&lt;br /&gt;
&lt;br /&gt;
The meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
: 9770 Patuxent Woods Drive&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 4/26/05'''&lt;br /&gt;
&lt;br /&gt;
Thanks to Bruce Potter for discussing a comparison of secure development on different operating systems.&lt;br /&gt;
&lt;br /&gt;
:* App Sec News&lt;br /&gt;
:** Sorry, this month's notes are lost.&lt;br /&gt;
&lt;br /&gt;
The meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.sourcefire.com/ SOURCEfire]&lt;br /&gt;
: 9770 Patuxent Woods Drive&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 3/22/05'''&lt;br /&gt;
&lt;br /&gt;
Thanks again to Aspect for providing pizza!&lt;br /&gt;
&lt;br /&gt;
:* App Sec News&lt;br /&gt;
:** SHA-1 defrocked (http://www.financialcryptography.com/mt/archives/000355.html)&lt;br /&gt;
:** XSS Proxy tool described by Andre Ludwig (http://xss-proxy.sourceforge.net/Advanced_XSS_Control.txt)&lt;br /&gt;
:*** Takes XSS vulnerability and exploits the hell out of it&lt;br /&gt;
:*** Potential demonstration in the future&lt;br /&gt;
:* Ethics Discussion&lt;br /&gt;
:** Harvard applicants rejected for &amp;quot;hacking&amp;quot; application website (http://www.pcworld.com/news/article/0,aid,119938,00.asp)&lt;br /&gt;
:*** Everyone was surprised at the many different opinions of culpability people had&lt;br /&gt;
:**Vulnerability Sharing Clubs like this one: http://www.immunitysec.com/services-sharing.shtml&lt;br /&gt;
:* Chapter Direction Discussion, Presentation Ideas&lt;br /&gt;
:** Are we advancing webappsec, teaching it, or both? Possible worksessions at future meetings to allow both to coexist&lt;br /&gt;
:** Inno Eroraha suggested cross-polinating with other focus groups in the DC area, ideas?&lt;br /&gt;
:** Andre Ludwig suggested a demo on the XSS Proxy tool, dates?&lt;br /&gt;
:** Matt Fisher suggested revisiting the Secure Model Architecture discussion, volunteers to get this started?&lt;br /&gt;
:** Matt Fisher suggested Absinthe and other SQL testing tools demonstration, dates?&lt;br /&gt;
:** Joe Bui suggested an outreach session held in DC to reach the government audience. Joe is checking for space availability at his office downtown.&lt;br /&gt;
:** Several people suggested having a Northern VA meeting. That was countered with the idea of an additional chapter. If someone in VA (or any other area near DC) would like to move one of our meetings to VA, please let me know. I think it's a good idea.&lt;br /&gt;
:* Penetration Testing Lab&lt;br /&gt;
:** Introduced the OWASP Penetration Testing Checklist (http://www.owasp.org/documentation/testing/application.html)&lt;br /&gt;
:** Introduced WebScarab (http://www.owasp.org/software/webscarab.html)&lt;br /&gt;
:** Introduced WebGoat (http://www.owasp.org/software/webgoat.html)&lt;br /&gt;
:** Gil Prine and Jeff Williams recommended the book, &amp;quot;Innocent Code&amp;quot; by Sverre H. Huseby&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 2/22/05'''&lt;br /&gt;
&lt;br /&gt;
No meeting this month due to chapter organizers being out of town. See you next month!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 1/25/05'''&lt;br /&gt;
&lt;br /&gt;
This month's meeting saw our biggest turnout yet, with over 20 attendees. Thanks to everyone for coming, thanks to&lt;br /&gt;
[mailto:dave.wichers@owasp.org Dave Wichers] for his presentation, and thanks to Aspect for providing pizza, soda and snacks!&lt;br /&gt;
&lt;br /&gt;
WebScarab and WebGoat presentation by Dave Wichers&lt;br /&gt;
&lt;br /&gt;
:* [http://www2.owasp.org/index.php/OWASP_WebScarab_Project WebScarab], written by [mailto:rogan@users.sourceforge.net Rogan Dawes] and donated to OWASP, has been around about five years in one form or another (please let Rogan know if you use it!)&lt;br /&gt;
:* Current version at http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61823&lt;br /&gt;
:* Includes a man-in-the-middle proxy, HTTP request/response editor, filtering traffic logger, session ID analyzer, passive web spider, automatic response modifier, encoder/decoder/hasher, and more; it’s also scriptable with Java Beanshell&lt;br /&gt;
:* Dave took us through several of the [http://www2.owasp.org/index.php/OWASP_WebGoat_Project WebGoat] lessons using WebScarab to manipulate traffic and explained common vulnerabilities like cross-site scripting&lt;br /&gt;
:* We were showed how to use WebScarab to intercept browser requests and change it before sending it to the server&lt;br /&gt;
:* Discussed some authentication and session management methods such as HTTP Basic Auth (bad), Tomcat JSESSIONID (good), using SSL only for the login (bad), etc.&lt;br /&gt;
:* WebScarab will point out which pages on your site set cookies&lt;br /&gt;
:* It will show you both raw and formatted HTTP requests and responses and show you a hex editor-like view of binary data such as images&lt;br /&gt;
&lt;br /&gt;
General Discussion&lt;br /&gt;
&lt;br /&gt;
:* Discussed the dilemma of accidentally finding a vulnerability on a public site...do you disclose or not? Will they think you’re a cracker or a saint...or just ignore you?&lt;br /&gt;
:* Discussed what other tools people use, commercial and free: Appscan, WebInspect, Sleuth, Nstealth, Achilles, Odysseus, Paros, etc. Some limited use of both the commercial and free scanning tools was identified.&lt;br /&gt;
:* Discussed web application &amp;quot;firewalls&amp;quot;. No one in the group indicated they were using any of these products.&lt;br /&gt;
:* DISA has a checklist for application security (called the Application Security Checklist) at: http://csrc.nist.gov/pcig/cig.html, and NIST is working on the FISMA guidelines, but until there’s a federal regulation on secure development it will be hard to convince them to (pay to) do it&lt;br /&gt;
:* Discussed the conundrum of developers having no motivation to think security; mentioned putting security requirements in the business/software requirements; mentioned the OWASP secure software contract annex (http://www.owasp.org/docroot/owasp/misc/contract.doc)&lt;br /&gt;
:* Discussed the new application code scanning tools, Ounce Lab's Prexis, Fortfy, and Klocwork were all mentioned. Some members had received briefings on them but no significant use was discussed.&lt;br /&gt;
:**Since the meeting, some articles about these tools have been identified and are included here for reference:&lt;br /&gt;
:*** Here's a recent (Jan 2005) article about Fortify: http://www.infoworld.com/article/05/01/14/03TCfortify_1.html&lt;br /&gt;
:*** Here's an older (Jul 2004) article about a previous release of Ounce's Prexis: http://www.sdtimes.com/news/106/story12.htm&lt;br /&gt;
:*** A summary of mostly open source application security code analysis tools is available here: http://sardonix.org/Auditing_Resources.html&lt;br /&gt;
:*** A general article about the emerging web app security capabilities: &amp;quot;Emerging web app security services and products bring source code vulnerabilities to light&amp;quot; http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss467_art975,00.html &lt;br /&gt;
:*** And in the same Information Security mag article is a summary chart of various product and service vendors in the space: http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss467_art978,00.html&lt;br /&gt;
:*** The Vendors' pages for these products are at:&lt;br /&gt;
:::: http://www.ouncelabs.com/prexis_engine.html&lt;br /&gt;
:::: http://www.fortifysoftware.com/products/suite/&lt;br /&gt;
:::: http://www.klocwork.com/products/inspect.asp&lt;br /&gt;
&lt;br /&gt;
Note: OWASP is not endorsing these products in any way. This information is simply provided for the interest of the members of &lt;br /&gt;
the DC Chapter.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 12/28/04'''&lt;br /&gt;
&lt;br /&gt;
No meeting this month due to the holidays. Happy holidays!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 11/23/04'''&lt;br /&gt;
&lt;br /&gt;
This month's meeting was again held in the first floor conference room at [http://www.aspectsecurity.com Aspect Security], the &lt;br /&gt;
chapter's sponsor. A couple &amp;quot;regulars&amp;quot; couldn't make it due to the holiday but it was still well-attended.&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Future meetings will continue to be on the fourth Tuesday of the month--so the next meeting will be on December 28, &lt;br /&gt;
again at 6pm. As long as Aspect can reserve the conference room for us, we'll continue meeting there.&lt;br /&gt;
&lt;br /&gt;
Minutes: A slightly smaller group allowed us to keep discussion on topic more easily this month.&lt;br /&gt;
&lt;br /&gt;
:* GEMS Demo: Demonstration of the insecurity of Diebold's General Election Management System (GEMS). See http://www.equalccw.com/dieboldtestnotes.html for more details.&lt;br /&gt;
:* DropMyRights: Discussed use of dropmyrights.exe when you're running as administrator but want to run your email and browser          with lower privileges. Just create a shortcut that contains &amp;quot;C:\Program Files\dropmyrights\DropMyRights.exe&amp;quot; &amp;quot;C:\Program Files\Internet Explorer\iexplore.exe&amp;quot; and use that instead of directly invoking the browser. See http://msdn.microsoft.com/security/securecode/columns/default.aspx?pull=/library/en-us/dncode/html/secure11152004.asp for the tool and a short article.&lt;br /&gt;
:* OWASP Secure Software Contract Annex: Jeff Williams prepared a draft of this document as a starting point for helping people write software development contracts that include security. We discussed how this contract emphasizes the lifecycle steps, whereas the Ounce Labs version emphasizes specific vulnerabilities. We also discussed the fact that the contract includes &amp;quot;requirements for the requirements&amp;quot; instead of trying to cover everything. The document needs more work on the &amp;quot;teeth,&amp;quot; i.e. how to ensure that each element is specific enough to audit. Also, it needs some more work on including risk-related activities before the requirements. The plan is to incorporate a few comments, get approval from the OWASP-Leaders, send it out to [http://www.securityfocus.com/archive/107 WebAppSec] and stand up an OWASP project to maintain the document.&lt;br /&gt;
:** The OWASP Mission: The contract discussion led into questions about OWASP's constituency and how we are serving them. One view is that OWASP serves developers and the contract effort is not exactly on target. The other view we discussed is that OWASP is focused on the problem of insecure software, and it should do whatever is necessary to raise awareness of the issue. We also discussed OWASP's role as a platform for the application security community. Is OWASP an &amp;quot;if you build it, they will come&amp;quot; model?&lt;br /&gt;
:** Open Letter and Requirements Project: We discussed the Open Letter and how it looks like the various product vendors will be working with OWASP to produce a strong list of requirements for all of web application security.&lt;br /&gt;
:* Reference Architectures: We discussed the concept for this project again, and examined Microsoft's Improving Web Application Security (http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnnetsec/html/threatcounter.asp). While an impressive effort, it seems like there is a need for platform independent documentation that covers the threat, requirements, and architecture levels, but doesn't go into the source code level.&lt;br /&gt;
:* J2EE Filters: Jeff gave a bit of background on how J2EE Filters works. Anil pointed out that this is very similar to how HTTP Handlers work in the .NET environment. We then discussed the types of things that J2EE Filters can do. Jeff showed how to write filters that implement a request rate throttle, an input sanitizer, a certificate validator, an SSL-only verifier, and several other functions. Some ideas raised by the group included a logging filter and a filter to verify that responses with set-cookie headers should only be sent over SSL.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 10/28/04'''&lt;br /&gt;
&lt;br /&gt;
This month we decided to meet in a conference room at [http://www.aspectsecurity.com Aspect Security], the chapter's sponsor. Aspect &lt;br /&gt;
was generous enough to provide sodas, chips, and the most delicious brownies anyone ever tasted. Thanks!&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Future meetings will be on the fourth Tuesday of the month--so the next meeting will be on November 23, again at 6pm. As &lt;br /&gt;
long as Aspect can reserve the conference room for us, we'll meet there again.&lt;br /&gt;
&lt;br /&gt;
Minutes: We tried to keep the discussion on three main topics: whitepaper topics, a concept for a &amp;quot;webappsec dashboard,&amp;quot; and J2EE &lt;br /&gt;
filters.&lt;br /&gt;
&lt;br /&gt;
:* Whitepaper topics: Jeff has a list of subjects he'd really like to   whitepapers about, but doesn't have time to write about himself. If anyone would like to volunteer to write a whitepaper to be posted on the OWASP site, [mailto:jeff.williams@owasp.org email Jeff]. Some of the topics that sparked a lot of discussion and interest were:&lt;br /&gt;
:** The asymmetric/broken market for security: Consumers can't determine if software is secure so they won't pay more for the claim of security; producers can't charge more for more secure software so they don't make it more secure. How do we get vendors to write secure code? How about for libraries--are the circumstances different? A related but possibly separate topic is, who has the burden of proof--the developer to prove software's secure, or the consumer to prove it's insecure?&lt;br /&gt;
:** Secure web app architectures: How do you draw security or secure web app architectures? We're not so good at telling customers where to do security things in the data flow and n-tier diagrams. Can we do this with UML? Data flow diagrams? How about a &amp;quot;reference architecture&amp;quot; for authentication as an example? This may turn out to be a Chapter project.&lt;br /&gt;
:** How to decide what to fix first: Is there a quick and easy way for a company with a large number of web apps to determine where they should begin with assessments? If they don't know about any vulnerabilities in any sites, which do they look at first? Maybe we can come up with a short questionnaire for each web app to risk rank them relatively, in the style of The [http://www.joelonsoftware.com/articles/fog0000000043.html Joel Test]. This may also become a Chapter project.&lt;br /&gt;
:** Mechanisms, vulnerabilities, and threat models: How do people threat-model attacks? Do they even do it? Could we create a standard suite of threat models for any generic web app?&lt;br /&gt;
:** Webappsec requirements: Are people putting security requirements into their business requirements for projects involving web apps? Can we create a standard list of security requirements people can paste in to their project docs?&lt;br /&gt;
:* Webappsec dashboard: The concern is that CISOs have no way to get their arms around the state of web app security in their environment. They need a sort of dashboard where they can see metrics and statistics about all their web apps all in one place. Something like this may have to be a tool/software, and OWASP really isn't in the business of writing tools/software.&lt;br /&gt;
:* J2EE filters: We didn't have time to discuss this but attendees were interested so it will be on the agenda for the next meeting. Jeff quickly demonstrated a tool to analyze JAR files and show what calls they make.&lt;br /&gt;
:* General discussion: More and more Local Chapters are springing up--what kinds of things can chapters contribute? What should they be expected to contribute?&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.aspectsecurity.com/contact.html Aspect Security]&lt;br /&gt;
: 9175 Guilford Rd&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 9/30/04'''&lt;br /&gt;
&lt;br /&gt;
A good time was had by all.&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Future meetings will be on the last Thursday of the month--so the next meeting will be on October 28, again at 6pm. If &lt;br /&gt;
anyone has a good suggestion about where to meet, please send it to the [http://lists.sourceforge.net/lists/listinfo/owasp-washington/list list].&lt;br /&gt;
&lt;br /&gt;
Minutes: None recorded.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.rockyrun.com/locations.htm Rocky Run Tap &amp;amp; Grill]&lt;br /&gt;
: 6480 Dobbin Center Way&lt;br /&gt;
: Columbia, MD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Notes - 8/25/04'''&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who showed up last night to the first OWASP Washington Local Chapter meeting. It was great to finally put some &lt;br /&gt;
faces to names, meet some local application security folks, and the Guinness was nice too!&lt;br /&gt;
&lt;br /&gt;
IMPORTANT: Meetings will be on the last Wednesday of the month--so the next meeting will be on September 29, again at 6pm. This time &lt;br /&gt;
we're going to meet in Columbia, MD at a place to be determined soon. If anyone has a good suggestion about where to meet, please &lt;br /&gt;
send it to the list.&lt;br /&gt;
&lt;br /&gt;
Minutes: We had some wide-ranging discussions that touched on scanning, brute-force attacks, validation, web app firewalls, and new &lt;br /&gt;
projects for OWASP.&lt;br /&gt;
&lt;br /&gt;
:* Brute force attacks: We discussed some schemes for handling brute force attacks on websites, some techniques for making a site hard to scan (and why some scanners don't care), and we discussed the combinatorics of generating productive password lists. We  also got a demo of Matt Fisher's password generation utility.&lt;br /&gt;
:* OWASP and awareness: We had a long discussion about things that OWASP can do to help raise awareness about web application security. Some promising approaches included making some webinars and offering them on the website, and providing more practical stuff (tools, libraries, templates) and not focusing on the academic.&lt;br /&gt;
:* OWASP image: We discussed some ways that OWASP could build on the &amp;quot;platform&amp;quot; provided by the new portal. We could move the webappsec list to OWASP from sourceforge, maybe create some different lists (newbie, advanced, SQL injection, etc.). We could  create some discussion forums.&lt;br /&gt;
:* Metrics: We talked about the new metrics project and what kinds of metrics would be the most useful to the appsec community.&lt;br /&gt;
:* Promoting adoption: There were some interesting ideas about things OWASP could do to advance the adoption of good appsec practices. One was to get some buy-in from the FBI (a la SANS) or another high-power agency. Matt Chalmers and Chris Burton are going to pursue a few leads to see if there's interest.&lt;br /&gt;
&lt;br /&gt;
This meeting was held at:&lt;br /&gt;
&lt;br /&gt;
: [http://www.mayorgaimports.com/html/retail-silverspring.php Mayorga Cafe]&lt;br /&gt;
: 8040 Georgia Av&lt;br /&gt;
: Silver Spring, MD&lt;/div&gt;</summary>
		<author><name>Trevor.Hawthorn</name></author>	</entry>

	</feed>