This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
(Local Officers)
Line 15: Line 15:
 
*<b>President:</b> Ralf Durkee
 
*<b>President:</b> Ralf Durkee
 
*<b>Vice President:</b> Chris Karr
 
*<b>Vice President:</b> Chris Karr
*<b>Secretary:</b> Steve Buck
+
*<b>Secretary and Treasurer:</b> Steve Buck
 
*<b>Web and Communications:</b> Michael Starks
 
*<b>Web and Communications:</b> Michael Starks
 
</ul>
 
</ul>
 
  
 
== Meeting Dates & Location ==
 
== Meeting Dates & Location ==

Revision as of 17:09, 30 October 2006

Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leader is Ralf Durkee

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

To join the chapter mailing list, please visit our mailing list homepage. The list is used to discuss the meetings and to arrange meeting locations. You can also review the email archives to see what folks have been talking about. Please check the mailing list before coming to a meeting to confirm the location and time and to catch any last minute notes.


Local Officers

    • President: Ralf Durkee
    • Vice President: Chris Karr
    • Secretary and Treasurer: Steve Buck
    • Web and Communications: Michael Starks

Meeting Dates & Location

Dates: The third Monday of every month, starting at 6:00 PM.

Location: 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) Google Map

Meeting space is graciously offered by Bryant & Stratton College Enter the Frontier Commons plaza, near the Post Office. Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant & Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.

October Meeting Details

Date: Monday, October 16, 2006, 6:00 PM

Presentation: The first of the OWASP top ten: unvalidated input, by Steve Buck.

At this meeting we will be discussing the first of the OWASP top ten list: unvalidated input. We will discuss the problems posed by not validating input on the server side. These problems include: forced browsing, command insertion, cross site scripting, buffer overflows, bypassing site security, format string attacks, SQL injection, cookie poisoning, and hidden field manipulation.

We will cover how to determine if you are vulnerable to one of these attacks, and also how to protect yourself. We will also have a demo of some of these exploits in action. Finally, we will have an open discussion with any questions about the subject matter.

Bio: Steve Buck is a consultant for Mindex Technologies. He has been working with various web technologies since 1996, involving everything from Perl and C CGIs to J2EE.

Steve has experience as a UNIX system administrator instructor with a specialty in system security.

Past Presentations

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint