This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Boston

From OWASP
Jump to: navigation, search

OWASP Boston

Welcome to the Boston chapter homepage. Follow @OWASPBOSTON on Twitter. The chapter leader is Jim Weiler. The Boston chapter is grateful for support from Constant Contact, Salesforce, Microsoft and Akamai for generously hosting space and their hospitality for various events.


The Chapter would also like to thank our sponsors for their generous support.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Chapter Sponsor

https://www.securityinnovation.com/

https://www.veracode.com/

Boston Application Security Conference

Boston-Banner-468x60.gif Twitter 32.png BASC 2019, the Boston Application Security Conference will take place 8:30am to 6:30pm on Saturday, October 19th at Microsoft, 5 Wayside Road, Burlington, MA. Read more

Chapter Meetings --- Our Fifteenth Year

We now use meetup to organize meetings.

We meet whenever a speaker and a venue have available dates, 6:30 to 9 pm.

Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. You can join the OWASP Boston Google group at https://groups.google.com/a/owasp.org/forum/#!forum/boston-chapter. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers.

Upcoming Meetings

May 22, 2019 - Watertown CMD+CTRL Web App Hacking Cyber Range 6:00-9:00pm  Partnered w/Security Innovation & Athenahealth

YOU CAN ONLY REGISTER ON THE SECURITY INNOVATION REGISTRATION SITE AT THIS LINK

Location: Athena Health Watertown

6PM *sharp*- Just bring your computer and evil inner-doer and you are ready to roll!

Want to test your skills in identifying web app vulnerabilities?  Join OWASP Boston, Athena Health and Security Innovation as members compete in CMD+CTRL, a web application cyber range where players exploit their way through hundreds of vulnerabilities that lurk in business applications today.  Success means learning quickly that attack and defense is all about thinking on your feet. Standard capture the flag using network and operating attack skills will not be much use here; understanding the OWASP Top 10 risks will help you find the vulnerabilities.

For each vulnerability you uncover, you are awarded points. Climb the interactive leaderboard for a chance to win prizes! CMD+CTRL is ideal for development teams to train and develop skills, but anyone involved in keeping your organization’s data secure can play - from developers and managers and even CISOs.

Just bring a laptop. Pizza and soda will be provided.

Venue/Location of the event:

Athena Health 311 Arsenal St. Watertown, MA 02472

NOTE: Park in only P2 visitor lot or in garages P1 and P3. Parking is free.

The main lobby door is at “S1” shuttle pickup icon.

Enter the lobby and sign in at the front desk to pick up credentials.

Directions to the event room will be provided at that time


Upcoming Training

TBD

Past Meetings

January 29th, 2019 - Cambridge Partnered with Security Innovation

Location: Quick Base office

5PM- Just bring your computer and evil inner-doer and you are ready to roll!

Security Innovation is teaming up with OWASP Boston to offer attendees a fun "find the vulnerabilities" game - CMD+CTRL Cyber Range - that shows how hackers break into websites and teaches the importance of secure coding habits.

The CMD+CTRL Cyber Range we will be using is called ShadowBank, a banking website where players compete to find vulnerabilities, score points, and move up the leaderboard. Leveraging cheat sheets, attack tables, and expert led training sessions, platers take their shot at stealing money, manipulating share prices, and conducting other nefarious acts.

June 14th, 2017 - Burlington Meetup

Location: SalesForce (was Demandware) 5 Wall St., Burlington, MA

Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.

5:30 - 6:15 - Chat, Chew and Brew

6:15 - 6:45 News, Announcements

Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)

7:00 pm Is RASP Ready?

Runtime Application Self-Protection is overhyped, according to many analysts and pundits. RASP promises applications that protect themselves - which sounds impossible - how can an application possibly protect itself? An agent that sits inside the app sounds like a deployment nightmare at worst, and a drain on the app at best. What’s the reality? Where are we now and what have we learned?

We’ve seen deployment successes and failures, and we will draw from those specific experiences to describe: Where does RASP work?

  • What applications are well-suited for RASP?
  • What types (organizational structure, culture, or skillset) of organizations are well-suited for RASP?

What is the reality of RASP?

  • Is RASP a deployment model or a feature set?
  • How mature is RASP? Is it an over-hyped immature space, enterprise-ready, or somewhere in between?
  • Which RASP capabilities do organizations use? And how do they validate those capabilities in their own environments?
  • Can RASP replace the WAF?

We will conclude, not with a sales pitch, but some lessons learned on: the three must have attributes for RASP, some suggestions on good candidates for RASP – both types of teams and types of applications, and finally - if, how, and when to get started.

Speaker: Michael Feiertag, CEO and Co-Founder, tCell Before co-founding tCell at the end of 2014, Michael led a string of successful products – most recently as head of products at Okta, and prior to that, as technology director at Blue Coat. Prior to Blue Coat, Michael held product management, engineering, and sales positions at several start-ups. Michael holds a B.S. from The University of Chicago, and an M.S. from the University of Maryland

May 2, 2017 - Burlington Meetup

Location: SalesForce (was Demandware) 5 Wall St., Burlington, MA

Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.

5:30 - 6:15 - Chat, Chew and Brew

6:15 - 6:45 News, Announcements

Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)

6:50 pm Random Number Generation - Lava Lamps, Clouds, New Standards and the IoT - Richard Moulds

The SANS Institute recently listed "Weak random number generators" as one of the 7 most dangerous security techniques to watch in 2017. But how do you really know how good your random numbers are? Virtualization and IoT make things worse and new standards are a wake-up call. Random numbers are the basis of security for all cryptography, yet they are often taken for granted. Without entropy, crypto is just math.  

Learn why random numbers are so hard to generate and validate, compare different technologies in use today across virtualized environments, and discuss operational steps to take the risk out of random numbers and help secure cryptosystems even into the era of quantum computers.

Speaker: Richard Moulds, General Manager of Whitewood Security, has spoken at RSA 2017 and at several OWASP chapter events in New York, Chicago and Austin. Richard has over 20 years of experience in the area of cryptography and encryption.


November 2, 2016 - Cambridge Meetup

Location: Akamai at 90 Broadway, Cambridge, MA 02142 (down the street from the usual location)

Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.

6:30 News, Announcements

7:00 'Advanced Persistent Legal Threats - William Gamble, JD, LLM, EMBA

Abstract: Good cyber security can protect IT infrastructure against many attacks. Because of the difficulty in monetizing cyber thefts, the direct loss of a breach can be limited. However, the legal costs, both from government agencies and plaintiffs, can be far greater. The legal landscape, both in the US and internationally is changing as fast if not faster than the technology.

Bio: I am a lawyer and a member of the Florida Bar.I used to practice tax, securities and banking law. I have written three books and spoken around the world on the economic efficiency of legal and regulatory infrastructures specifically in emerging markets like China. Over the past two years, I have immersed myself in cyber security. I now hold the CompTIA A+, Network+, and Security+. I will take the CASP next month. Besides keeping up with the regulations, I am studying incident response and auditing. I am also working toward my health care law certification. My hero is Dr. Johannes Ullrich.

September 28, 2016 - Burlington - Meetup

Location: Demandware at 5 Wall St., Burlington, MA

6:00 News, Announcements

6:15 OWASP Top 10 #1 - Injection Flaws

Jim Weiler will discuss XML External Entity Injection flaws; how it works, how to prevent, code examples.

6:45 'From the Frontlines of RASP Adoption - Goran Begic, VP of Product, IMMUNIO

Runtime Application Self-Protection (RASP) is one of the newest technologies coined by Gartner and it is in early stages of adoption in the industry. It promises dynamic defense and automatic mitigation of vulnerabilities in web applications.

This presentation is a summary of experiences from several dozens of commercial evaluations and early adoptions in production that took place this year and provides some examples of situations and challenges that are not specific to any individual vendor. In this talk Goran will provide an overview of buying criteria and evaluation requirements across different industries and some typical pitfalls that can slow down adoption.

After the introduction and a brief reminder on the technology Goran will invite audience to participate in discussion about organizational requirements for adoption and operationalization of RASP.

Questions for discussion:

My application is under attack.

  • What actions should I take?
  • Who owns the response?
  • Which attacks should I respond to and which ones can I ignore?
  • How to get started with mitigation provided by technology?
  • Does RASP fit with DevOps?
  • Does RASP help with remediation?

What this presentation is not: This is not a product pitch in any way. Evaluation criteria, comparison of RASP with IAST and other security technologies, personal experiences and examples discussed in this talk are generally applicable to all RASP solutions.

Key takeaways:

At the end of the presentation you will:

  • get a better understanding of requirements for evaluation of RASP and its use cases,
  • if you can pull a successful evaluation alone, or if you will need participation of other groups / teams
  • learn about critical criteria for success of RASP in production
  • how this criteria different relative to appsec testing tools.


September 7, 2016 - Cambridge - Meetup

Location: Akamai at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)

6:30 News, OWASP tools, documents review

7:00 Docker Containers and Application Security - Tsvi Korren

Docker containers are transforming the way applications are developed and deployed. Closely tied to DevOps and Continuous Delivery, containers introduce both risks and opportunities to security management in Web applications. This talk will introduce the basic concepts of containers, how companies use them today and how to support this technology while elevating the security posture of your application stacks.

Tsvi Korren, CISSP, has been an enterprise IT professional for 20 years with background in business process consulting in large organizations. Most recently at CA Technologies, he worked across verticals in government, retail, financial institutions and healthcare to implement compliance and security processes, from Identity and Access to Host and Server Controls. Tsvi is currently the director of technical services at Aqua, concentrating on building bridges between DevOps and Security.

June 8, 2016 - Burlington - Meetup

Location: Demandware at 5 Wall St., Burlington, MA

6-6:30 News, announcements, job postings, etc.

6:30-7 Introduction to SQL Injection - Jim Weiler

7:00 Computer Science Curricula’s Failure - What Should We Do Now? - Ming Chow & Roy Wattanasin

We are still facing the same security vulnerabilities from over a decade ago. The problems are not going away anytime soon and a reason is because Computer Science curricula are still churning out students who are not even exposed to security. This talk will address the lack of emphasis on information security in Computer Science curricula, how CS curricula have an obligation, how to gradually fix the problem by integrating security into many Computer Science undergraduate and graduate classes, and success stories from students. This talk will also discuss what Tufts and Brandeis are currently working on to further address the security education problem by creating a joint cyber security and policy program that spans multiple departments. Additional points and feedback from the audience are encouraged to help with the issue. All are encourage to attend to submit your feedback to help!

Presenters:

Ming Chow - @0xmchow

Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He was a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World, DEF CON, Intel, SOURCE Conference, and BSides Boston. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2014 and 2015.


Roy Wattanasin - @wr0

Roy Wattanasin is an adjunct faculty at Brandeis University in both the Health and Medical Informatics and Information Security graduate programs. He spends most of his time leading, teaching and developing information security programs, finding vulnerabilities, performing incident response and working on many projects. Roy has spoken at many conferences including RSA, ISSA International, Source Conference, Braintank, Cyber Security World, OWASP and the Security BSides conferences. He is also a healthcare information security professional. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2015.

May 4, 2016 - Cambridge - Meetup

Location: Slightly different Akamai location: 90 Broadway, Cambridge, MA 02142 between Meadhall and the Mariott

6:30 News, OWASP tools, documents review

7:00 The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP - Dan Cornell

There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.

This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.

Dan Cornell is a globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application security program management platform. Cornell was Principal Investigator as Denim Group researched and developed the Hybrid Analysis Mapping (HAM) technology that lies at the heart of ThreadFix, through a Small Business Innovation Research (SBIR) contract with the Department of Homeland Security's Science and Technology Directorate.

More information at: http://www.denimgroup.com/about_team_dan.html

April 6, 2016 - Cambridge - Meetup

Location: Akamai at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)

6:30 News, OWASP tools, documents review

7:00 Runtime Application Self-Protection (RASP) Tools - Kunal Anand

This talk will highlight the latest in AppSec and dive into a different kind of solution called Runtime Application Self-Protection (RASP). We'll also explore a new methodology called language theoretic security (LANGSEC) and explain how it can outperform existing approaches like pattern matching, regular expressions, etc. This talk will lay the foundation via informal and formal theory how lexers, tokenizers and parsers work. We’ll move onto constructing an open source toolchain to analyzing data and exploring interactive data visualizations. Along the way, we’ll cover performance tradeoffs and discuss the challenges of modern application security.

Kunal Anand is the co-founder and CTO of Prevoty, a runtime application security platform. Prior to that, he was the Director of Technology at the BBC Worldwide, overseeing engineering and operations across the company’s global Digital Entertainment and Gaming initiatives. Kunal also has several years of experience leading security, data and engineering at Gravity, MySpace and NASA’s JetPropulsion Laboratory. His work has been featured in Wired Magazine and Fast Company. Kunal received a B.S. from Babson College.

Past Training

March 16, 2016 - Burlington - Meetup

Location: Demandware, Burlington.

6:00 News, OWASP tools, documents review

6:30 Software Security by the Numbers - Chris Eng

Deep dive into data we’ve collected about the state of software security in 2016

  • Based on scans of 200,000+ applications over an 18-month period
  • How different industries and programming languages compare to one another
  • Vulnerability remediation habits and patterns
  • Three characteristics of a successful AppSec program

Chris Eng is vice president of research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies. Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.

January 26, 2016 - Waltham - Meetup

Location: Constant Contact, Waltham. Trapelo Rd. exit from Rt. 128, toward Lincoln. The parking lot entrance is on the right, at the first traffic light. Drive around to the front of the office complex, facing the highway. Enter under the clock tower. Park in the front of the building and enter in the main building lobby, continue down the hallway and you will see the innovation center, enter in the large glass doors.

7:00 News, OWASP tools, documents review

7:20 What Security Testing Tools Miss

Black Duck Software presents - Static analysis, dynamic analysis, and other testing tools are all essential weapons against adversaries. But for the 80%+ of companies worldwide that use open source software in their application development these tools are ineffective in identifying and mitigating open source security risks . This presentation will cover:

The value of static and dynamic tools, and where they best fit in the Secure Development Lifecycle

Why these tools are not useful in identifying known vulnerabilities in open source components

Controls development and security professionals can deploy to select, detect, manage and monitor open source for existing and newly disclosed vulnerabilities

Food will be provided by Constant Contact.


November 2015 - Cambridge - Meetup

When: Wednesday, November 4, 6:30 pm

Location: Akamai at 150 Broadway Cambridge, MA 02142 (aka 8 Cambridge Center)

6:30 News, views, announcements, conversation

7:00 Interactive Discussions (Come and ask your questions!)

Attendee interaction is always mentioned as a high value at meetings and was great at the MetroWest meetings, so we're doing that at Akamai this month. Some discussion starters so far: SSL certificate impacts from CA/Browser alliance decisions and SHA1 weakness; mutual (client) SSL, javascript client and server side; what the heck is threat intelligence, dev ops and faster secure SDLC.

July 2015 - Metrowest

When: Wednesday, July 20, 7:00 pm

Location: Constant Contact, Innovation Center, Reservoir Place, 1601 Trapelo Road, Waltham, MA 02451

7:00 News, views, announcements, conversation

7:30 Access in Maliceland - Risk Based Access Control - Gunnar Peterson

John Lambert observed attackers win because while defenders think in lists, attackers think in graphs. Access control systems divide the system a priori into secure and insecure states. But that’s only worth the paper its printed on. A Attackers see the system as it is, for attackers, the access control scheme is the beginning of the game not the end. Determined attackers seek out access control models and then find holes that they can leverage. Access control systems that purport to protect the system are built on assumptions from which reality diverges. Application security needs a new approach to access control- adding feedback loops for risk based decisions, fine-grained, dynamic access control.

Security is a business with a very long list of issues and requirements. The spreadsheets are miles long. This makes it essential to find reusable solution patterns that can address multiple problems.This presentation looks at both medium term improvements and code examples to improve access control decisions and overall security today

Gunnar Peterson (@oneraindrop) focuses on security architecture consulting and training. Experience includes Associate Editor for IEEE Security & Privacy Journal, a Microsoft MVP for App security, an IANS Research Faculty member, a Securosis Contributing Analyst, and a Visiting Scientist at Carnegie Mellon Software Engineering Institute. He maintains a popular information security blog at http://1raindrop.typepad.com.

July 2015 - Cambridge

When: Wednesday, July 8, 6:30 pm NOTE: It's the second Wednesday this month.

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News, views, announcements, conversation

7:00 Interactive Discussions (Come and ask your questions!)

June 2015

When: Wednesday, June 3, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News, views, announcements, conversation

7:00 Put Down the Megaphone: Effective Security Advocacy Without the Shouting - Darren Meyer

10 years’ experience in the InfoSec community--including work with organizations in many verticals, in sizes ranging from startups to Fortune 50 enterprises, leading Application Security teams, building and delivering security instruction to developers, managers, and InfoSec professionals—has taught me the importance of crafting advocacy for different audiences. In this talk, I share my experiences in learning to be an effective advocate with three key audiences: developers, management, and non-technical staff.

Darren is an Application Security advocate and researcher, technology hobbyist, and maker. He loves to learn, teach, nerd out, and inflict terrible puns on people. His background includes logistics, software development, and an assortment of information security roles including leading AppSec programs and professional security instruction targeting developers, managers, and InfoSec professionals.

May 2015

When: Wednesday, May 6, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News, views, announcements, conversation

7:00 How the crowd is discovering critical vulns missed by traditional methods - Leif Dreizler

State of the art security programs are turning to bug bounties to leverage a vast array of skill-sets and knowledge. Learn why these programs work, when to deploy them, and how you can bring these new application security testing capabilities into your own organization. The speaker will discuss real world examples from bug bounties and focus on cases where business logic flaws and high priority vulnerabilities were found ... even with existing security testing processes in place.

Attendees will learn:

Testing methods deployed by our crowd that help them find bugs the scanners miss

Examples of the high quality of bugs our crowd is finding, including P1'sTrends which vulnerability types are found most often and whyWhat is the ROI on the pay for performance modelWhere does the SDLC merge into crowdsourced testing

Leif Dreizler is a Senior Security Engineer at Bugcrowd, the innovator in crowdsourced security testing for the enterprise. Prior to joining Bugcrowd, Leif was a Senior Application Security Engineer at Redspin, performing application security assessments. During his time at Redspin he also served as the Application Team Lead, liaising with clients at the engineering and sales level. He has also made minor contributions to the Firebug project. Leif attended the University of California, Santa Barbara where he studied Computer Science. Leif recently spoke to the NYC Security Meet-up group.

April 2015

When: Wednesday, April 1, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News, views, announcements, conversation

Jim Weiler Will show some actual examples and patterns of SQL Injection attempts

7:00 Are You An Imposter? Me too! - Patrick Laverty

Many people in the information security field feel like a fraud, or an imposter. In reality, we often know far more, and are capable of far more than we believe we do. There is so much to know and we constantly hear about the latest groundbreaking research done by others, which makes us feel less important or worthy. Let’s talk about what Imposter Syndrome is, its prevalence, and then we can start to realize just how capable we are and go forward with the confidence in the field.

March 2015

When: Wednesday, March 4, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News, views, announcements, conversation

7:00 Prioritizing Web Application Vulnerabilities – A Hacker’s Perspective - Nick Silver

The best application risk models capture not only the technical risk factors, but also the business context in which an asset lives. Traditionally, this is done by auditing application owners on an array of questions in order to properly classify the asset and its data – but that takes time which could be better spent elsewhere. We interviewed dozens of hackers and asked them which vulnerabilities they would look for first depending on the type of attack they wanted to carry out. We’ll walk through several examples of how to use this data as a shortcut means for prioritizing risk without the need for any pesky audit questionnaires.

Nick Silver is a Senior Solutions Architect with WhiteHat Security. He is responsible for translating business requirements into technical ones and assisting businesses in implementing web security programs. Previously, Nick led a team in WhiteHat’s Threat Research Center where they were responsible for testing more than 2,000 of their customers’ websites for vulnerabilities.

February 2015

When: Wednesday, February 4, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News review, announcements - Jim Weiler

7:00 Incident Response and Web Application Security - Stories from the Trenches - Fred House and Joe Ceirante

Mandiant has conducted numerous incident response engagements throughout its history, including a record number of 200 incidents in 2014. Mandiant consultants Fred House and Joe Ceirante will discuss case studies and trends Mandiant has observed in relation to web application security.

Topics will include the types of threat actors that target web applications, the techniques they use to compromise web applications, and the activities they perform once inside the network. Techniques for detecting and mitigating web compromises will also be reviewed. All content will be derived from the real-world compromises that Mandiant has investigated.

January 2015

When: Wednesday, January 7, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News review, risk analysis of Poodle - Jim Weiler

7:00 How a Hacker Views Your Web Site - Patrick Laverty

The most popular presentation of BASC 2014

As defenders, we have to be right 100% of the time where an attacker only needs to be right once. The attack surface of a modern web site is incredibly large and we need to be aware of all of it. Additionally, individual attacks may not always be effective but sometimes using them together can gain the desired effect. In this talk, we’ll take a look at the whole attack surface for a typical web site and the various ways that an attacker will use to compromise a site.

December 2014

When: Wednesday, December 3, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 News and Views You Can Use and Abuse - Jim Weiler

  • Some thoughts and analysis on some current app security news and other stuff
  • Adobe password breach
  • Reducing Web Application Firewall SQL injection false positives

7:15 Swift and Security - Ming Chow

Apple is pushing its new programming language Swift for iOS development and for many good reasons. This talk will discuss what the language has right in terms of security, the old and new security pitfalls, and what developers need to be aware of moving forward with using the new language. The fact to the matter is, iOS isn't going away, iOS developers will need to learn and use Swift, and there will be a big rush of Swift-based apps: we might as well learn how to do it right the first time around.

Ming Chow is an Instructor at the Department of Computer Science, Tufts University. Ten years of web development experience. Specialties: Web and Mobile Development, Web and Mobile Security

July 2014

Topics: Grails Security and Validating Cross-Site Scripting Vulns with xssValidator

Presenters: Cyrus Malekpour and John Poulin

When: Tuesday, July 8, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Topic 1: Grails Security

Grails is a framework developed for Groovy in the vein of Rails for Ruby. It provides a lot of features for web app security, but does it do enough? What might you need to implement yourself, and what might be provided? This presentation will discuss tips on securing Grails applications, including tools that the framework provides by default for security. It'll also discuss several shortcomings in the current toolset, and how you can avoid them.

Cyrus Malekpour (@cmalekpour) is currently interning at nVisium, working on web app development and security. He's currently an undergraduate student at the University of Virginia, where he's studying computer science with an emphasis on security and backend development.

Topic 2: Validating Cross-Site Scripting Vulns with xssValidator

xssValidator is a tool developed to automate the testing and validation of Cross-Site Scripting (xss) vulnerabilities within web applications. Automated scanners tend to report large amounts of false-positives, and as consultants we're forced spending our time trying to verify these findings. xssValidator leverages scriptable web-browsers such as PhantomJS and Slimer.js to automatically validate these findings.

John Poulin is an application security consultant for nVisium who specializes in web application security. He worked previously as a web developer and software engineer that focused on building multi-tier web applications. When he's not hacking on web apps, John spends his time building tools to help him hack on web apps! You can find him on twitter: @forced_request and on myspace: REDACTED.

June 2014

Topic: Training: SQL Injection and the OWASP Zed Attack Proxy (ZAP)

Presenters: Rob Cheyne and Jim Weiler

When: Wednesday, June 4, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

6:30 - general networking, news discussion, announcements.

7:00 - main presentations

The June 4th meeting will be the second in our series of 2014 training meetings. Rob Cheyne will continue explaining and exploring SQL Injection by conducting an actual injection attack.

This will be a demo-based discussion to get into the mindset of an attacker, and show how an attacker goes after a site. Demo will include:

  • BurpProxy demo
  • Common authentication flaws
  • SQL Injection Demo that shows the process and how it builds to a full compromise

Rob Cheyne is currently CEO of Big Brain Security. In addition to security consulting for Fortune 500 customers, he was the author of LC4, a version of the award-winning L0phtCrack password auditing tool, and he also worked on the code scanning technology that was eventually spun off as Veracode. Rob was at @stake from the very first customer all the way through to the $50M acquisition by Symantec.

Jim Weiler will introduce the OWASP Zed Attack Proxy (ZAP). This is a very powerful free OWASP intercepting proxy that lets you see, analyze, change, replay etc. every browser request and response, analyze your session, scan and attack web sites, save the results and run reports. We can't cover all the functionality but we'll show some practical tips and techniques.

Pizza, salad and soda courtesy of Akamai

March 2014

Topic: Training: SQL Injection, WebGoat, Cross Site Request Forgery Presenter: Benjamin Lerner When: Wednesday, March 5, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

There will be three training sessions:

One will be on SQL Injection - intro, detection, prevention, scanning and false positives. This is the most serious web application vulnerability.

The second will be on OWASP WebGoat. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE or in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. There are hints and 39 different lesson plans on various vulnerabilities and technologies. We won't cover all of them of course!

The third will be on Cross Site Request Forgery - not a hack really, it's just the way the web works. But it causes apps to do legitimate things that you didn't ask them to do.

Pizza and drinks provided by Akamai.

January 2014

When: Wednesday, January 8, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Topic: JavaScript Verification: From Browsers to Pages

Modern web browsers implement a "private browsing" mode that is intended to leave behind no traces of a user's browsing activity on their computer. This feature is in direct tension with support for *extensions*, which let users add third-party functionality into their browser. I will discuss the scope of this problem, present our approach to verifying extensions' compliance with private browsing mode, and sketch our findings on several real, third-party extensions. I will then briefly describe the toolkit underlying our approach, and end with a sketch of a newer project, adapting this approach to the very different-seeming problem of statically catching errors when using the jQuery library.

Presenter: Benjamin Lerner

Benjamin Lerner has just completed a post-doctoral research position in the PLT group at Brown University, and is now a lecturer at Northeastern University. His research examines the challenges of analyzing client-side web programming, from the behavior of web pages down through the semantics of the browser. He received a PhD in Computer Science from the University of Washington in 2011, building a platform to analyze conflicts between browser extensions, and a B.S. in Computer Science and Mathematics from Yale University.

November 2013

When: Wednesday, November 6, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Topic: Attacking iOS Applications

Slides: On slideshare

This presentation will cover the basics of attacking iOS applications (and their back ends) using a web proxy to intercept, modify, and repeat HTTP/HTTPS requests. (The proxy used during research was Burp; however, any HTTP intercepting proxy such as OWASP ZAP could be used) From setting up the proxy to pulling data from the backend systems, this talk will be a great primer for anyone interested in testing iOS applications at the HTTP protocol level. There will be a short (2 minute) primer on setting up the intercepting proxy, followed by three practical examples showing how to intercept data headed to the phone, how to modify data heading to the application server, and how to pull extra data from application servers to further an attack. All of these examples will focus on native iOS apps (Game Center and Passbook) and/or functionality (Passbook Passes).

Presenter: Karl Fosaaen

Karl is a senior security consultant at NetSPI. This role has allowed Karl to work in a variety of industries, including financial services, health care, and hardware manufacturing. Karl specializes in network and web application penetration testing. In his spare time, Karl helps out as an OPER at THOTCON and a swag goon at DEF CON.


October 2013

When: Wednesday, October 2, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Topic: Abusing NoSQL Databases

The days of selecting from a few SQL database options for an application are over. There is now a plethora of NoSQL database options to choose from: some are better than others for certain jobs. There are good reasons why developers are choosing them over traditional SQL databases including performance, scalabiltiy, and ease-of-use. Unfortunately like for many hot techologies, security is largely an afterthought in NoSQL databases. This short but concise presentation will illustrate how poor the quality of security in many NoSQL database systems is. This presentation will not be confined to one particular NoSQL database system. Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, encryption; and those that affect specific NoSQL database systems such as MongoDB and CouchDB. The ideas that we now have a complicated heterogeneous problem and that defense-in-depth is even more necessary will be stressed. There is a common misconception that SQL injection attacks are eliminated by using a NoSQL database system. While specifically SQL injection is largely eliminated, injection attack vectors have increased thanks to JavaScript and the flexibility of NoSQL databases. This presentation will present and demo new classes of injection attacks. Attendees should be familiar with JavaScript and JSON.

Presenter: Ming Chow

Ming Chow (@tufts_cs_mchow) is a Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He teaches courses largely in the undergraduate curriculum including the second course in the major sequence, Web Programming, Music Apps on the iPad, and Introduction to Computer Security. He was also a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World (2011 and 2012), DEF CON 19 (2011), the Design Automation Conference (2011), Intel, and the SOURCE Conference (Boston 2013). Ming's projects in information security include building numerous CTF challenges, Internet investigations, HTML5 and JavaScript security, and Android forensics.


September 2013 - Joint Meeting with Boston Cloud Services 

When: Tuesday, September 10, 6 pm

Location: Microsoft NERD Center (not our usual location)

Note: This is a joint meeting. Please register at the Boston Cloud Services meetup page if you plan to attend.

There will be two presentations at this meeting:

Topic: People Centric Security (PCS)

Presenter: Nick Stamos

People Centric Security (PCS) is a new security model, presented as part of Gartner's Maverick Research 2 year ago. PCS is well suited for Cloud Business/Consumer services such as Dropbox, Google Drive, SkyDrive, etc. PCS enables users to have what they desire, and provides enterprises what they require for data governance and compliance. Nick Stamos co-founded his fourth company, nCrypted Cloud in July of 2012. His past startups include Verdasys, Phase Forward (IPO FY2004, $685M Oracle Acquisition 2010), and Amulet. He studied at Tufts University where he received a BSEE and MSEE.

Topic: SSL Certs

Presenter: Jim Weiler

Practical experiences with issuing and risk assessing SSL certs for enterprise applications on a cloud provider: who creates the CSR, how do you protect the private key on the cloud server, certs on cloud provider managed load balancers vrs 3rd party managed app servers, roles and responsibilities of cloud IT, 3rd party developer IT, enterprise IT and service providers. Jim Weiler is Application Security Architect at Starwoods Hotels and the Chapter Leader of OWASP Boston.


July 2013 - Doubleheader!

Location: Akamai at 8 Cambridge Center in Cambridge, MA

When: Wednesday, July 10, 6:30 pm

Topic: RailsGoat

Presented by: Ken Johnson

Abstract: While working to secure rails applications in a truly Agile development environment, it became clear that the Rails and Ruby ecosystem needed attention from the security community in the form of free and open training, and the events that have transpired within the last few months have only reinforced that belief. RailsGoat is an attempt to bring attention to both the problems that most frequently occur in Rails as well as the solutions for remediation. To accomplish this, we've built a vulnerable Rails application that aligns with the OWASP Top 10 and can be used as a training tool for Rails-based development shops.

Topic: PhoneGap on Android

Presented by: Jack Mannino

Abstract: PhoneGap is a widely used framework that allows developers to rapidly build cross-platform mobile applications using HTML5, JavaScript, and CSS. Using PhoneGap plugins, developers can call native platform APIs from browser-like applications using JavaScript. This approach introduces vulnerabilities that are not typically as prevalent within native Android applications, warranting a fresh look at the way we view mobile applications. In this presentation, we will take a deep look at the Android implementation of the framework and we will examine the overall attack surface for applications. Real-world examples of vulnerable applications will be demonstrated as well in order to provide context, entertainment, and enjoyment.

About the Speakers:

Ken Johnson is the former Manager of LivingSocial.com's application security team where he built their security program before leaving for his true home as the CTO of nVisium Security, a VA-based application security company. Ken is the primary developer of the Web Exploitation Framework and contributes to other open source application security projects as often as time permits. He has spoken at AppSec DC 2010 and 2012, OWASP NoVA and Phoenix chapters, Northern Virginia Hackers Association (NoVAH) and is a contributor to the Attack Research team.

Jack Mannino is the CEO of nVisium Security, a VA-based application security company. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest in identifying security issues and trends on a large scale. Jack is a leader and founder of the OWASP Mobile Security Project. He is the lead developer for the OWASP GoatDroid project, and is the chairman of the OWASP Northern Virginia chapter.


June 2013

Topic: We see the future…and it isn’t pretty

Presented by: Andrea Mulligan, Sr. Director at Veracode

Location: Akamai at 8 Cambridge Center in Cambridge, MA

When: Wednesday, June 5, 6:30 pm

In this session Andrea presents research findings from the State of Software Security Report, which offers a before the breach look at security by examining the flaws commonly found in applications of all kinds. She will also examine what the research findings mean for security, predict how these flaws could cause history to repeat itself, and discuss how security pros can help change the future.

May 2013

Topic: Systems Thinking + Web Security

Presented by: Akamai

Location: Akamai at 8 Cambridge Center in Cambridge, MA

When: Wednesday, May 1, 6:30 pm

Akamai will present on ‘Systems Thinking + Web Security’. There will also be an audience review exercise facilitated by the Akamai presenters. This is a great chance to hear some interesting perspectives on web security from Akamai, who handles about one third of all internet traffic.

April 2013

Topic: Go Fast. Be Secure: Effectively Govern the Use of Open Source Components Throughout the SDLC

Presented by: Sonotype

Location: Akamai at 8 Cambridge Center in Cambridge, MA

When: Wednesday, April 3, 6:30 pm

  • Open Source Software (OSS) Component supply chain complexities and realities. Open source is constantly changing and knowing the version in your software, as well as the current version history of the component (how do you show an auditor you are using a current version) is important.
  • Open Source Consumption Patterns from the Central Repository. Which versions are the most popular can tell you which versions are the most stable, useful, secure etc.
  • OWASP Top 10 (A9) - Using Components with Known Vulnerabilities. To decide on the risk of OSS components with vulnerabilities, you need to know the vulnerabilities, their severity and which components they occur in as well as where in the code dependency tree they are.
  • OSS Security, Quality and License policies must be woven into the development process. Knowing the number and type of open source licenses in your software can be important to the legal standing of your code and if it conflicts with any corporate standards. The licensing is also important in order to know the restrictions on changing the software.
  • OSS Component Policy Examples
  • Example Application Compositions Reports
  • Example Use cases IDE, CI, repository, production applications
  • Discussion

About Sonatype:

Sonatype operates the Central Repository, the industry's primary source for open-source components, housing more than 400,000 components and serving more than five billion requests per year from more than 60,000 organizations. The company has been a pioneer in component-based software development since its founding by Jason van Zyl, the creator of the Apache Maven build management system and the Central Repository.

March 2013

Topic: What is BSIMM?

Speaker: Nabil Hannan

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Nabil is Director of Vulnerability Assessments and Managing Consultant at Cigital.

The purpose of the BSIMM is to quantify the activities carried out by real software security initiatives. BSIMM is a study of the secure development practices of over 50 organizations, analyzed along the dimensions that were found in the data, not along preconceived ideas of what secure development should be.

BSIMM describes the work of 974 software security group members working with a satellite of 2039 people to secure the software developed by 218,286 developers.

The BSIMM describes 111 activities that any organization can put into practice. The activities are described in twelve practices grouped into four domains. Associated with each activity is an objective.


February 2013

Topic: BroBot

Speaker: Eric Kobrin, Akamai

When: Wednesday, February 6, 6:30 pm

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Eric Kobrin is a Senior Security Architect in the Infosec organization of Akamai Technologies, the global leader in Cloud-based application acceleration and content delivery. Eric has been involved in Software Architecture for over 15 years, having worked at such companies and IBM, Velocitude and eDiets.com. He has a passion for programming languages, security, and software performance and has worked in all layers of the software stack from hypervisors to complex servers and web applications. Eric's works have been published, presented at international conferences and patented.

His presentation will provide an analysis of the BroBot DDOS attacks, including discussion of:

  • Vulnerable system discovery
  • Zombie compromise
  • Control structure
  • Attack traffic
  • Mitigation steps


January 2013

Topic: Third-Party Application Analysis: Best Practices and Lessons Learned

Speaker: Chad Holmes, Veracode

Location: Akamai at 8 Cambridge Center in Cambridge, MA

Chad Holmes will present details of the work Veracode has been doing with their 3rd Party program, discuss the technical and business challenges that have arisen during that time and lead a discussion on what team members can do to help drive adoption of security best practices across their vendor community.

The flow of the presentation is designed to drive discussion within an audience – both from a technical and business perspective with some anecdotal stories. Chad wants this to be an interactive discussion so he’ll have questions and you should bring yours I’ve already sent him some. The order of the presentation is:

· Adoption rates of externally developed software

· The risk within those apps

· Some deeper stats on what “3rd party” really means (total outsourcing/total COTS produced/open source/imported libraries/etc)

· Some raw data about our experiences (to show this is based on a large sample size rather than “Look how awesome Veracode is!”)

· Challenges that will be faced (business, intellectual property, policy, analysis capabilities, etc)

· Best Practices for high rates of adoption

· Lessons Learned and Recommendations

Chad Holmes has over 10 years of software development and application security experience. During his time at Veracode, Chad has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns. In addition to his third-party analysis responsibilities, Chad's previous work as a Security Program Manager has lead to the successful roll out and improvement of multiple corporate application security groups.

June 2012

Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA)

Speaker Will Vandevanter - Rapid 7

Fingerprinting web applications of all kinds

This turbo talk will introduce a new Metasploit module that fingerprints "known" web applications, attempts the default credentials for the application, and runs an associated exploit or authenticated access module if applicable. Some example fingerprints in the database target common enterprise web applications including Microsoft products (Outlook Web Access, Sharepoint), printers (Xerox Document Centre), security cameras, routers, and others.

Will Vandevanter is a senior penetration tester and researcher at Rapid7. His focus interests include web application security and secure code. He has previously spoken at Defcon, SOURCE, BSides LV, and other conferences.


May 31 2012

Location - Jobspring, Boston. 545 Boylston st.

Speaker - Glenn Gramling, Vice President, Cenzic

“Cloudy with a Chance of Hack”

Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud solutions out there - one of the main being security. Most cloud applications were built for ease of use and without security necessarily in mind. Companies need to be asking their solution providers about the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. In this session, we'll give attendees tips and tricks to prepare them for the potential of "stormy weather."

Glenn Gramling is responsible for global sales and business development for Cenzic’s application security.


April 11, 2012

Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA)

Speaker - David Eoff, Senior Product Marketing Manager, HP Enterprise Security

David is a Senior Product Marketing Manager, within the Enterprise Security Products division of HP focused on Fortify application security. His 18+ years of background in software and hardware enterprise marketing provides a solid foundation for his marketing of the HP security solutions.

Prior to joining Fortify in 2009 and being acquired by HP, David ran Firewall and IPS marketing for the Security division of Nokia Corporation. In addition, he has held multiple positions in product marketing, product management, channel marketing and sales while working for Oracle, EMC, Legato, BMC Software and several start-ups.

Topic - Gray, the New Black: Gray-Box Vulnerability Testing

Over the years, two key techniques have emerged as the most effective for finding security vulnerabilities in software: Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST). While DAST and SAST each possess unique strengths, the “Holy Grail” of security testing is thought to be “hybrid” – a technique that combines and correlates the results from both testing methods, maximizing the advantages of each. Until recently, however, a critical element has been missing from first generation hybrid solutions: information about the inner workings and behavior of applications undergoing DAST and SAST analysis.

This presentation will introduce you to the next generation of hybrid security analysis – what it is, how it works, and the benefits it offers. It will also address (and dispel) the claims against hybrid, and leave you with a clear understanding of how the new generation of hybrid will enable organizations to resolve their most critical software security issues faster and more cost-effectively than any other available analysis technology.

March 8, 2012, with the Boston Security Meetup group

Location - JobSpring, Boylston St.

Topic - Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers

Speaker - VP for Security Research at ZScaler, along with other speakers at the security meetup.

Today, everything from kitchen appliances to television sets come with an IP address. Network connectivity for various hardware devices opens up exciting opportunities. Forgot to lower the thermostat before leaving the house? Simply access it online. Need to record a show? Start the DVR with a mobile app. While embedded web servers are now as common as digital displays in hardware devices, sadly, security is not. What if that same convenience exposed photocopied documents online or allowed outsiders to record your telephone conversations? A frightening thought indeed.

Software vendors have been forced to climb the security learning curve. As independent researchers uncovered embarrassing vulnerabilities, vendors had little choice but to plug the holes and revamp development lifecycles to bake security into products. Vendors of embedded web servers have faced minimal scrutiny and as such are at least a decade behind when it comes to security practices. Today, network connected devices are regularly deployed with virtually no security whatsoever.

The risk of insecure embedded web servers has been amplified by insecure networking practices. Every home and small business now runs a wireless network, but it was likely set up by someone with virtually no networking expertise. As such, many devices designed only for LAN access are now unintentionally Internet facing and wide open to attack from anyone, regardless of their location.

Leveraging the power of cloud based services, Zscaler spent several months scanning large portions of the Internet to understand the scope of this threat. Our findings will make any business owner think twice before purchasing a 'wifi enabled' device. We'll share the results of our findings, reveal specific vulnerabilities in a multitude of appliances and discuss how embedded web servers will represent a target rich environment for years to come.

December 13, 2011, 6:30, Microsoft NERD, Cambridge, Horace Mann Room

Jeremiah Grossman – Founder and CTO WhiteHat Security

Directions: http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx

September 14 2011

Dinis Cruz - OWASP O2 Platform

The O2 Platform is focused on automating application security knowledge and workflows. It is a library of scriptable objects specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox).

September 7 2011

Adriel Desautels – Differences between Penetration Testing and Vulnerability Scanning


July  2011

Anurag Agarwal, the founder of MyAppSecurity

Session 1 - Managing Risk with Threat Modeling Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development. By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.

Session 2 - False Positive, False Negative and False Sense of Security This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program.

Thursday June 2

Location - Microsoft NERD - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx

Topic - Bringing Sexy Back: Defensive Measures That Actually Work

Presenter - Paul Asadoorian, Founder & CEO, PaulDotCom Enterprises

There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you "own" the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up "traps" for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to "enterprise security". This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include:

  • Using wireless “attacks” on the attackers
  • Implementing the Metasploit Decloak engine to find the attackers
  • Setting traps to detect web application attacks
  • Integrating results into your enterprise log management tool

The goal of this talk is to make defense “sexy”…

Presenter Bio

Paul Asadoorian is currently the "Product Evangelist" for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning "PaulDotCom Security Weekly" podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of "WRT54G Ultimate Hacking", a book dedicated to hacking Linksys routers.

Thursday May 26

Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA)

Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference

Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston

Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References.

Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing

Presenter - Arshad Noor, StrongAuth

The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information.

This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations.

Presenter Bio

Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years.

 CANCELLED    

Topic – Secure Application design and Coding -- CANCELLED

Presenter - Josh Abraham, Rapid 7

Speaker Bio

April 2011

Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group


March 2011

Josh Abraham, Rapid 7

Owning the world, one mobile app at a time, and web services pen testing.


Febrary 2011

Rob Cheyne, CEO of Safelight Security -

Security Leadership series: Delivering a successful security presentation


December 2010

Application Architecture Security Assessment - Second session

Rob Cheyne, CEO SafeLight Security Advisors


November 2010

Open SAMM – Software Assurance Maturity Model

Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company.


October 2010

Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture & design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view.

July 2010

Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF).

Main Presentation - Drive-by Pharming with MonkeyFist

Joey Peloquin - Director of Application Security, Fishnet Security

June 2010

Rob Cheyne Lightning Talk - topic to be announced

Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs.

May 2010

Rob Cheyne Lightning Talk - SQL Injection

Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling


April 2010

Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications.

March 2010

Zack Lanier - Disclosure Samsara, or "the endless vulnerability disclosure debate"

http://n0where.org/talks/samsara_20100310.html

http://n0where.org/talks/samsara_20100310.pdf (very large PDF)


February 2010

Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities


January 2010 at Microsoft NERD, Cambridge

Josh Abraham, Rapid 7 Technologies

December 2009

Eric Bender, Cenzic

November 2009

Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners

Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools


October 2009

Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF & VA Unite


September 2009 at CORE Technologies, Boston

Paul Asadoorian, Pauldotcom.com

Alex Horan, CORE Security


May 2009

Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly presentation pdf


March 2009

Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis

ExploitMe Document

Framework Level Threat Analysis document

Meeting Pizza Sponsor - Arcot

Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware.

Arcot can be contacted thru Michael Kreppein, [email protected], 617-467-5200

December 2008

Brian Holyfield, Gothem Digital Science

Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/

June 2008

Jeremiah Grossman; Founder and CTO, Whitehat Security

Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript

Main Topic - Business Logic Flaws: How they put your Websites at Risk

March 2008

Chris Eng; Senior Director, Security Research, Veracode

Description – Attacking crypto in web applications

December 2007

Scott Matsumoto; Principal Consultant, Cigital

Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security

Cigital Presentation

November 2007

Tom Mulvehill Ounce Labs

Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles

Ounce presentation


October 2007

George Johnson, Principal Software Engineer EMC; CISSP

An Introduction to Threat Modeling.


September 2007

Day of Worldwide OWASP 1 day conferences on the topic "Privacy in the 21st Century"

June 2007

Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries

Danny Allan; Director, Security Research, Watchfire

Topic: Exploitation of the OWASP Top 10: Attacks and Strategies

March 2007

Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006


January 2007

Dave Low, RSA the Security Division of EMC: encryption case studies


November 2006


September 2006

Mike Gavin, Forrester Research: Web Application Firewalls


June 2006

Imperva - Application and Database Vulnerabilities and Intrusion Prevention

Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool


May 2006


April 2006

Dennis Hurst; SPI Dynamics: A study of AJAX Hacking

Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints!


March 2006

Mateo Meucci; OWASP Italy Anatomy of 2 web attacks

Tom Stracener; Cenzic Web Application Vulnerabilities


February 2006

Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source


January 2006

David Low, Senior Field Engineer: RSA Practical Encryption


December 2005

Paul Galwas, Product Manager: nCipher Enigma variations: Key Management controlled


November 2005

Robert Hurlbut, Independent Consultant Threat Modeling for web applications


October 2005

Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - Identity Federation : Prospects and Challenges

Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways


September 2005

Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security


July 2005

Mark O'Neill, CTO: Vordel - Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security

June 2005

Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security Overview of Application Security Tools


May 2005

Patrick Hynds, CTO: Critical Sites - Passwords - Keys to the Kingdom


April 2005

Jonathan Levin - Of Random Numbers

Jothy Rosenberg, Founder and CTO: Service Integrity - Web Services Security


March 2005

Joe Stagner: Microsoft Let's talk about Application Security


Feb 2005

Application Security Inc. PowerPoint slides for the Anatomy of a Database Attack.

Local Chapter Information

To find out more about the Boston chapter, just join the OWASP Boston mailing list.

The chapter shipping/mailing address is:

OWASP Boston
35 Wachusett Dr
Lexington, MA 02421


Links

Reviews of security podcasts

Boston Application Security Conference 2017

Boston Application Security Conference 2016

Boston Application Security Conference 2015

Boston Application Security Conference 2014

Boston Application Security Conference 2013

Boston Application Security Conference 2012

Boston Application Security Conference 2011

Boston Application Security Conference 2010


Boston OWASP Chapter Leaders

Contact

President

Board of Directors