This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Washington DC"

From OWASP
Jump to: navigation, search
Line 6: Line 6:
  
 
Welcome to the Home Page of the Washington DC OWASP Chapter.<br><br>
 
Welcome to the Home Page of the Washington DC OWASP Chapter.<br><br>
 
  
  
Line 24: Line 23:
  
 
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.<br><br>
 
Chapter meetings are held several times a year, typically at a location provided by our current facility sponsor.<br><br>
 
 
  
 
'''Next Meeting'''
 
'''Next Meeting'''
 
 
  
 
The next meeting will be on Thursday, September 27, 2012 from 6:30 PM to 8:30 PM (EDT) at  
 
The next meeting will be on Thursday, September 27, 2012 from 6:30 PM to 8:30 PM (EDT) at  
 
 
  
 
'''Location:''' LivingSocial HQ 1445 New York Ave NW Washington, DC (http://goo.gl/maps/PQ1Ad) 2nd Floor, Golf Cart Conference Room
 
'''Location:''' LivingSocial HQ 1445 New York Ave NW Washington, DC (http://goo.gl/maps/PQ1Ad) 2nd Floor, Golf Cart Conference Room
 
 
  
 
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 
 
 
  
 
'''Speaker:''' Jan Poczobutt, Director of Enterprise ADC & WAF, Barracuda Networks
 
'''Speaker:''' Jan Poczobutt, Director of Enterprise ADC & WAF, Barracuda Networks
 
 
  
 
'''Presentation Overview:''' Enterprise data center security teams are being challenged to rapidly deploy and secure new applications while controlling costs and improving efficiency. Jan Poczobutt, Director of Enterprise ADC & WAF at Barracuda Networks, will provide an inside look at some of the problems with traditional access management implementations and how enterprises can sucessfully overcome these challenges by integrating web application firewall technologies with Identity and Access Management. Learn about best practices, specific use cases and how this new integration translates into operational simplicity for the enterprise.
 
'''Presentation Overview:''' Enterprise data center security teams are being challenged to rapidly deploy and secure new applications while controlling costs and improving efficiency. Jan Poczobutt, Director of Enterprise ADC & WAF at Barracuda Networks, will provide an inside look at some of the problems with traditional access management implementations and how enterprises can sucessfully overcome these challenges by integrating web application firewall technologies with Identity and Access Management. Learn about best practices, specific use cases and how this new integration translates into operational simplicity for the enterprise.
 
 
 
 
  
 
= Participation =
 
= Participation =
 
 
  
 
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.
 
OWASP Local Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics.
 
 
  
 
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].<br><br>
 
If you would like to make a presentation, or have any questions about the DC Chapter, send an email to one of the chapter co-chairs or the [mailto:owasp-washington__AT__lists.owasp.org Mailing List].<br><br>
 
 
  
 
= Twitter =
 
= Twitter =
Line 73: Line 49:
  
 
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' <twitter>23609877</twitter>
 
'''You can follow us on Twitter as [http://twitter.com/owaspdc @OWASPDC]''' <twitter>23609877</twitter>
 
 
  
 
| style="width: 110px; font-size: 95%; color: rgb(0, 0, 0);" |
 
| style="width: 110px; font-size: 95%; color: rgb(0, 0, 0);" |
  
 
|}
 
|}
 
 
 
 
  
 
= News & Recent Meetings =
 
= News & Recent Meetings =
 
 
  
 
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]<br><br>
 
Archives from earlier meetings than contained on this page can be found in the [[Washington_DC Archives]]<br><br>
 
 
  
 
'''July 2012 Meeting'''
 
'''July 2012 Meeting'''
 
 
 
 
 
  
  
 
'''Topic''': OWASP Top Ten Tools and Tactics
 
'''Topic''': OWASP Top Ten Tools and Tactics
  
 +
'''Abstract''': If you've spent any time defending web applications as a security analyst, or perhaps as a developer seeking to adhere to SDLC practices, you have likely utilized or referenced the OWASP Top 10. Intended first as an awareness mechanism, the Top 10 covers the most critical web application security flaws via consensus reached by a global consortium of application security experts. The OWASP Top 10 promotes managing risk in addition to awareness training, application testing, and remediation. To manage such risk, application security practitioners and developers need an appropriate tool kit. This presentation will explore tooling, tactics, analysis, and mitigation for each of the Top 10. This discussion is a useful addition for attendees of Security 542: Web App Penetration Testing and Ethical Hacking.
  
 
+
'''Bio''': Russ McRee is a senior security analyst, researcher, and founder of holisticinfosec.org, where he advocates a holistic approach to the practice of information assurance. As manager of Microsoft Online Service's Security Incident Management team his focuses are incident response and web application security. He writes toolsmith, a monthly column for the ISSA Journal, and has written for numerous other publications including Information Security, (IN)SECURE, and OWASP. Russ speaks regularly at conferences such as DEFCON, Black Hat, RSA, FIRST, RAID, SecureWorld Expo, as well as ISSA events. IBM's ISS X-Force cited him as the 6th ranked Top Vulnerability Discoverers of 2009. Additionally, Russ volunteers as a handler for the SANS Internet Storm Center (ISC).
'''Abstract''': If you've spent any time defending web applications as a security
 
 
 
analyst, or perhaps as a developer seeking to adhere to SDLC
 
 
 
practices, you have likely utilized or referenced the OWASP Top 10.
 
 
 
Intended first as an awareness mechanism, the Top 10 covers the most
 
 
 
critical web application security flaws via consensus reached by a
 
 
 
global consortium of application security experts. The OWASP Top 10
 
 
 
promotes managing risk in addition to awareness training, application
 
 
 
testing, and remediation. To manage such risk, application security
 
 
 
practitioners and developers need an appropriate tool kit. This
 
 
 
presentation will explore tooling, tactics, analysis, and mitigation
 
 
 
for each of the Top 10. This discussion is a useful addition for
 
 
 
attendees of Security 542: Web App Penetration Testing and Ethical
 
 
 
Hacking.
 
 
 
 
 
 
 
'''Bio''': Russ McRee is a senior security analyst, researcher, and founder of
 
 
 
holisticinfosec.org, where he advocates a holistic approach to the
 
 
 
practice of information assurance. As manager of Microsoft Online
 
 
 
Service's Security Incident Management team his focuses are incident
 
 
 
response and web application security. He writes toolsmith, a monthly
 
 
 
column for the ISSA Journal, and has written for numerous other
 
 
 
publications including Information Security, (IN)SECURE, and OWASP.
 
 
 
Russ speaks regularly at conferences such as DEFCON, Black Hat, RSA,
 
 
 
FIRST, RAID, SecureWorld Expo, as well as ISSA events. IBM's ISS
 
 
 
X-Force cited him as the 6th ranked Top Vulnerability Discoverers of
 
 
 
2009. Additionally, Russ volunteers as a handler for the SANS Internet
 
 
 
Storm Center (ISC).
 
 
 
 
 
  
 
'''8:15-9:15 Speaker''': Kevin Johnson
 
'''8:15-9:15 Speaker''': Kevin Johnson
 
 
  
 
'''Topic''': Ninja Assessments: Stealth Security Testing for Organizations
 
'''Topic''': Ninja Assessments: Stealth Security Testing for Organizations
 
 
  
 
'''Abstract''': Organizations today need to be able to easily integrate security testing within their existing processes. In this talk, Kevin Johnson of Secure Ideas will explore various techniques and tools to help organizations assess the security of the web applications. These techniques are designed to be implemented easily and with little impact on the work load of the staff.
 
'''Abstract''': Organizations today need to be able to easily integrate security testing within their existing processes. In this talk, Kevin Johnson of Secure Ideas will explore various techniques and tools to help organizations assess the security of the web applications. These techniques are designed to be implemented easily and with little impact on the work load of the staff.
 
 
  
 
'''Bio''': Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.
 
'''Bio''': Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.
 
 
  
 
'''May 2012 Meeting'''
 
'''May 2012 Meeting'''
 
 
 
 
  
 
'''Speaker''': Rohit Sethi, Vice President, Product Development, SD Elements
 
'''Speaker''': Rohit Sethi, Vice President, Product Development, SD Elements
 
 
  
 
'''Topic''': Is There An End to Testing Ourselves Secure?
 
'''Topic''': Is There An End to Testing Ourselves Secure?
 
 
  
 
'''Abstract''': Despite years of research on best practices to integrate security into the early phases of the SDLC, most organizations rely on static analysis, dynamic analysis, and penetration testing as their primary means of eliminating vulnerabilities. This approach leads to discovering vulnerabilities late in the development process,  thereby either causing project delays or risk acceptance.
 
'''Abstract''': Despite years of research on best practices to integrate security into the early phases of the SDLC, most organizations rely on static analysis, dynamic analysis, and penetration testing as their primary means of eliminating vulnerabilities. This approach leads to discovering vulnerabilities late in the development process,  thereby either causing project delays or risk acceptance.
 
 
  
 
This talk is an open discussion about the presence, if any, of scalable, measurable, approaches working to address security into the SDLC.  Consideration for how Agile development impacts effectiveness will be explored.
 
This talk is an open discussion about the presence, if any, of scalable, measurable, approaches working to address security into the SDLC.  Consideration for how Agile development impacts effectiveness will be explored.
 
 
  
 
Points of discussion include:
 
Points of discussion include:
 
 
  
 
·        Is static analysis sufficient?
 
·        Is static analysis sufficient?
 
 
 
 
·        Developer awareness training
 
·        Developer awareness training
 
 
 
 
·        Threat modeling / architecture analysis
 
·        Threat modeling / architecture analysis
 
 
 
 
·        Secure requirements
 
·        Secure requirements
 
 
 
 
·        Considerations for procured applications
 
·        Considerations for procured applications
 
 
  
 
'''Bio''': Rohit Sethi is a specialist in building security controls into the software development life cycle (SDLC). Rohit is a SANS course developer and instructor on Secure J2EE development. He has spoken and taught at FS-ISAC, RSA, OWASP, Shmoocon, CSI National, Sec Tor, Infosecurity New York and Toronto, TASK, the ISC2's Secure Leadership series conferences, and many others. Mr. Sethi has written articles for Dr. Dobb's Journal, TechTarget, Security Focus and the Web Application Security Consortium (WASC), and he has been quoted as an expert in application security for ITWorldCanada and Computer World. He also leads the OWASP Design Patterns Security Analysis project.
 
'''Bio''': Rohit Sethi is a specialist in building security controls into the software development life cycle (SDLC). Rohit is a SANS course developer and instructor on Secure J2EE development. He has spoken and taught at FS-ISAC, RSA, OWASP, Shmoocon, CSI National, Sec Tor, Infosecurity New York and Toronto, TASK, the ISC2's Secure Leadership series conferences, and many others. Mr. Sethi has written articles for Dr. Dobb's Journal, TechTarget, Security Focus and the Web Application Security Consortium (WASC), and he has been quoted as an expert in application security for ITWorldCanada and Computer World. He also leads the OWASP Design Patterns Security Analysis project.
 
 
  
 
Register for the meeting at http://owaspdc.eventbrite.com/
 
Register for the meeting at http://owaspdc.eventbrite.com/
 
 
  
 
'''March 2012 Meeting'''
 
'''March 2012 Meeting'''
 
 
  
 
March 15th at 6:30-7:30pm at LivingSocial's [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] office location on the first floor at the @hungryacademy.<br>
 
March 15th at 6:30-7:30pm at LivingSocial's [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] office location on the first floor at the @hungryacademy.<br>
 
 
  
 
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 
Please RSVP for the event here: http://owaspdc.eventbrite.com/
 
 
  
 
'''Speaker''': Alissa Torres
 
'''Speaker''': Alissa Torres
 
 
  
 
'''Topic''': Application Footprinting
 
'''Topic''': Application Footprinting
 
 
  
 
'''Abstract''': Application footprinting is a great skill for forensic examiners (and anyone interested in binary research) because it allows you to marry artifacts in the registry/file creation/time/date stamps with specific applications or user initiated events.  Eventually, during the course of an investigation, an examiner is going to run into a "new" problem - one that hasn't previously been experienced/researched by others in the field.  Application footprinting is a simple method that examines the interaction of a program with the operating system.  The process of footprinting will determine if the application was installed on the system being investigated, what trace evidence exists and how that can be mined.  This presentation will include a demo of Active Registry Monitor and its use in tracking changes made to the Windows Registry by an open source ssh client.
 
'''Abstract''': Application footprinting is a great skill for forensic examiners (and anyone interested in binary research) because it allows you to marry artifacts in the registry/file creation/time/date stamps with specific applications or user initiated events.  Eventually, during the course of an investigation, an examiner is going to run into a "new" problem - one that hasn't previously been experienced/researched by others in the field.  Application footprinting is a simple method that examines the interaction of a program with the operating system.  The process of footprinting will determine if the application was installed on the system being investigated, what trace evidence exists and how that can be mined.  This presentation will include a demo of Active Registry Monitor and its use in tracking changes made to the Windows Registry by an open source ssh client.
 
 
  
 
'''Bio''': Alissa Torres currently works as a security researcher for KEYW Corporation in Maryland and has 10 years technical expertise in the information technology field. Previously, she was a digital forensic investigator on a government contractor security team. She has extensive experience in information security, spanning government, academic and corporate environments and holds a Bachelor’s degree from University of Virginia and a Master’s from University of Maryland in Information Technology. Alissa taught as an instructor at the Defense Cyber Investigations Training Academy (DCITA), teaching incident response and network basics to security professionals entering the forensics community. In addition, she has presented at various industry conferences and currently holds the following industry certifications: GCFA, CISSP, EnCE.
 
'''Bio''': Alissa Torres currently works as a security researcher for KEYW Corporation in Maryland and has 10 years technical expertise in the information technology field. Previously, she was a digital forensic investigator on a government contractor security team. She has extensive experience in information security, spanning government, academic and corporate environments and holds a Bachelor’s degree from University of Virginia and a Master’s from University of Maryland in Information Technology. Alissa taught as an instructor at the Defense Cyber Investigations Training Academy (DCITA), teaching incident response and network basics to security professionals entering the forensics community. In addition, she has presented at various industry conferences and currently holds the following industry certifications: GCFA, CISSP, EnCE.
 
 
 
 
 
 
  
 
'''December 2011 Meeting'''
 
'''December 2011 Meeting'''
 
 
  
 
'''The December 21st meeting was held at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''<br><br>
 
'''The December 21st meeting was held at [http://maps.google.com/maps?q=1445+New+York+Avenue+Northwest,+Washington+D.C.,+DC&hl=en&sll=37.0625,-95.677068&sspn=44.204685,93.076172&z=16 1445 New York Ave NW] (Living Social) in Washington DC.'''<br><br>
 
 
  
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br><br>
 
This location is very close to both the McPherson Square and Metro Center WMATA train stations.<br><br>
 
 
  
 
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages
 
* Please '''[https://www.regonline.com/owaspdcdecember2011 Register]''' for the meeting. This helps us get a head count for food and beverages
Line 277: Line 122:
  
 
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!
 
* '''Doug Wilson''' and '''Mark Bristow''' will update on current and upcoming events, including AppSecDC 2012 and chapter plans for the next year, including an '''Important Announcement''' for 2012. Don't miss it!
 
 
 
 
  
 
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.
 
'''Location Info''' Please come up to the second floor, we'll just be meeting in the room off the Living Social kitchen area.
 
 
 
 
  
 
'''About our Speakers'''
 
'''About our Speakers'''
 
 
  
 
:'''Ken Johnson'''
 
:'''Ken Johnson'''
 
 
  
 
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty<br><br>
 
::Ken Johnson is a Senior Security Architect for LivingSocial.com responsible for securing mobile applications, web services and web applications. Additionally he is the primary developer of the Web Exploitation Framework (wXf) and contributes to several open source security projects. He lives in Northern Virginia with his lovely wife Tracy and spends his weekends either stuffing his face with Sushi or getting demolished in Call of Duty<br><br>
 
 
  
 
:'''Chris Gates'''
 
:'''Chris Gates'''
 
 
  
 
::TBD<br><br>
 
::TBD<br><br>
 
 
  
 
::'''Abstract: Updates in wXf''' - Coming Soon<br>
 
::'''Abstract: Updates in wXf''' - Coming Soon<br>
 
 
 
 
 
 
  
 
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&oe=utf-8 2445 M Street NW Washington, DC 20037]'''
 
Our '''September Meeting''' was '''September 29th 6:30pm''' at '''[http://maps.google.com/maps?q=2445+M+Street+NW+Washington,+District+of+Columbia+20037+United+States&oe=utf-8 2445 M Street NW Washington, DC 20037]'''
  
 
<br>
 
<br>
 
 
  
 
'''Speakers'''<br>
 
'''Speakers'''<br>

Revision as of 13:50, 25 September 2012


Welcome to the Home Page of the Washington DC OWASP Chapter.


  • Please subscribe to the mailing list for meeting announcements.
  • You can follow us on Twitter as @OWASPDC
  • Our recent meetings are documented on the News & Meetings tab.





<paypal>Washington DC</paypal>



September Meeting:


Facility Sponsor: Living Social      Refreshment Sponsor: Still Open!