This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Phoenix"
(→Agenda) |
(→Next Phoenix OWASP meeting is scheduled for Thursday, March 8th starting at 6:30PM.) |
||
Line 40: | Line 40: | ||
* Browser Safety / Security<br/> | * Browser Safety / Security<br/> | ||
− | == Next Phoenix OWASP meeting is scheduled for Thursday, | + | == Next Phoenix OWASP meeting is scheduled for Thursday, May 10th starting at 6:30PM. == |
====Where==== | ====Where==== | ||
Line 52: | Line 52: | ||
====When==== | ====When==== | ||
− | 6:30PM, Thursday, | + | 6:30PM, Thursday, May 10th |
====Agenda==== | ====Agenda==== | ||
Line 58: | Line 58: | ||
''' 6:30 to 6:45 News & Introductions''' | ''' 6:30 to 6:45 News & Introductions''' | ||
− | ''' 6:45 to 7:45 (1 hour): | + | ''' 6:45 to 7:45 (1 hour): TBD Presenter / Presentation''' |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
'''7:45 to 8:00: Wrap up''' | '''7:45 to 8:00: Wrap up''' |
Revision as of 20:03, 9 March 2007
OWASP Phoenix
Welcome to the Phoenix chapter homepage. The chapter leader is Jon Rose
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
Local News
New pages on Phoenix/Tools and Phoenix/ToolsProfile
At the chapter meeting on January 11th, 2007 we discussed the possibility of comparing tools. Jon Rose presented the idea that we do round-table discussions on rating web application vulnerability assessment tools that we use. Andre Gironda suggested that we put the tools into categories and benchmark for performance in addition to evaluating the potential/easiness of vulnerability discovery.
There is a page on Phoenix/Tools with a near-complete and up-to-date list of WAVA Tools. If you find that a tool is not on the list, feel free to add it. However, the list will not be updated until the ToolsProfile project nears completion (or at least once per month).
Instead of subjectively choosing which tools to focus on, we will focus on what tools we actually use in daily/weekly assessment work. By completing profiles on what tools we individually use, we can further identify how the tools are being used, why they are being used, and possibly why certain tools are chosen over others. Please see the Phoenix/ToolsProfile page for further information.
New Phoenix chapter open!
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We are currently planning on holding bi-monthly meetings with two speakers at each meeting.
Tenative Meeting Schedule:
- March 8, 2007
- May 10, 2007
- July 12, 2007
- September 13, 2007
- November 8, 2007
What talks would you like to see?
Please Update
- Certificates
- Application Firewalls
- PHP
- Security ROI
- Penetration Testing Methods
- AJAX
- Cryptography in Web Applications
- Reversing ActiveX controls
- Using Local Proxies
- Browser Safety / Security
Next Phoenix OWASP meeting is scheduled for Thursday, May 10th starting at 6:30PM.
Where
UAT - University of Advancing Technology
Auditorium
2625 West Baseline Road
Tempe, Arizona
85283-1056
Entrance back of building
When
6:30PM, Thursday, May 10th
Agenda
6:30 to 6:45 News & Introductions
6:45 to 7:45 (1 hour): TBD Presenter / Presentation
7:45 to 8:00: Wrap up
8:00: Social
Tilted Kilt
650 West Warner Road, Tempe AZ
Let us know if you have any questions or comments on the mailing-list.
Previous Meetings
Data@Risk – Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.
Web Application 0-Day – Jon Rose
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. We’ll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.
Discovering Web Application Vulnerabilities with Google CodeSearch
Building Application Security into the SDLC - Adam Muntner
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to "bake security in" rather than "ice it on."