|
|
(122 intermediate revisions by 13 users not shown) |
Line 1: |
Line 1: |
− | ==Next Meeting: February 2, 2010== | + | |
| + | |meetupurl=https://www.meetup.com/OWASP-Chicago-Chapter/|region=United States}} |
| | | |
− | Mark your calendars - agenda to follow.
| + | Everyone is welcome to join us at our chapter meetings. |
| | | |
− | 'Make sure you sign up for the mailing list to receive meeting announcements.'
| + | [[Category:OWASP Chapter]] |
− | | |
− | We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago
| |
− | | |
− | ==General Information==
| |
− | | |
− | Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.
| |
− | | |
− | If you have any questions about the Chicago chapter, please send an email to our chapter leaders [ mailto:[email protected] Cory Scott] or [ mailto: [email protected] Jason Witty.] | |
− | | |
− | Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]
| |
− | | |
− | <paypal>Chicago</paypal>
| |
− | == Chapter Meetings ==
| |
− | | |
− | The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to [email protected] by February 1st so we can enter your name into the building's security system. | |
− | | |
− | | |
− | ==Agenda==
| |
− | | |
− | 6:00 Refreshments and Welcome
| |
− | | |
− | 6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates
| |
− | | |
− | 7:15 Assessing Thick Web Applications - Timur Duehr
| |
− | | |
− | ==Presentation abstracts==
| |
− | | |
− | ''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''
| |
− | | |
− | ABSTRACT
| |
− | | |
− | The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.
| |
− | | |
− | SPEAKER BIO
| |
| | | |
− | Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.
| + | If you're interested in speaking, sponsoring or hosting an event, [mailto:info@owasp-chicago.org please contact us]. |
| + | <br/> |
| + | = General Information = |
| | | |
− | ''Assessing Thick Web Applications''
| + | Anyone in our area interested in application security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics. |
| | | |
− | ABSTRACT
| + | Follow (and/or DM us) on Twitter: [https://twitter.com/owaspchicago @owaspchicago]<br> |
| + | LinkedIn: https://www.linkedin.com/groups/4049846<br/> |
| + | Chat with us on SLACK. https://owasp.slack.com/ |
| + | <br/> |
| + | <br/> |
| | | |
− | Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.
| + | Interesting in being a sponsor or presenting at an event? Contact us at info@owasp-chicago.org |
| | | |
− | While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.
| |
| | | |
− | SPEAKER BIO
| |
| | | |
− | Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.
| |
− |
| |
− | == Presentation Archives ==
| |
− |
| |
− | Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]
| |
− |
| |
− | Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]
| |
− |
| |
− | Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]
| |
− |
| |
− | Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]<BR>
| |
− |
| |
− | Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]<BR>
| |
− |
| |
− |
| |
− | '''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''
| |
− | Thomas Ptacek, Matasano Security
| |
− |
| |
− | Where modern network architecture meets legacy application design, we get "The Port 80 Problem": vendors wrapping every conceivable network protocol in a series of POSTs and calling them "safe". These "Webapps In Name Only" are a nightmare for application security specialists.
| |
− |
| |
− | In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:
| |
− |
| |
− | - Locating and Decompiling Java and .NET Code
| |
− | - Structure and Interpretation of Binary Protocols in HTTP
| |
− | - Protocol Debugging Tools
| |
− | - Web App Crypto Tricks
| |
− |
| |
− | '''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''
| |
− | Cory Scott, ABN AMRO
| |
− |
| |
− | A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement "true" two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions.
| |
− |
| |
− | ==== Chicago OWASP Chapter Leaders ====
| |
− | | |
− |
| |
− | | |
| __NOTOC__ | | __NOTOC__ |
− | <headertabs/> | + | <headertabs /> |
− | [[Category:OWASP Chapter]]
| |
− | [[Category:Illinois]]
| |
Everyone is welcome to join us at our chapter meetings.
Anyone in our area interested in application security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.