This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Ottawa"

From OWASP
Jump to: navigation, search
Line 15: Line 15:
 
|
 
|
 
|}
 
|}
 
<br>
 
 
 
 
 
 
 
 
 
 
  
  
Line 43: Line 32:
 
<br>
 
<br>
 
<br>
 
<br>
==N00bs Night: Secure Code Review==
+
==Sploitego - Maltego's (Local) Partner in Crime==
 
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.
 
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.
  
 
===What===
 
===What===
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)
+
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.
 +
 +
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.
 +
 +
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.
  
 
===Who===
 
===Who===
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).
+
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.
  
 
===When===
 
===When===
The event is being planned for June 21st from 6pm - 9pm. The event will start around 6:30pm to allow everyone to settle in.
+
The event is being planned for December 13th from 6pm - 8pm.
  
 
===Where===
 
===Where===

Revision as of 02:46, 4 December 2012

OWASP Ottawa

Welcome to the Ottawa chapter homepage. The chapter's president is Sherif Koussa


Follow us on Twitter

<paypal>Ottawa</paypal>


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG



2keys%20(big).jpg



Your Local Chapter

Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: Sherif, Sergei, Mike or tweet at us owasp_ottawa.

Hope to see you at a meeting soon.








Sploitego - Maltego's (Local) Partner in Crime

Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.

What

Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.

Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.

Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.

Who

Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.

When

The event is being planned for December 13th from 6pm - 8pm.

Where

Our friends at Shopify have agreed to host yet another OWASP event! (address/map can be found on the registration page)

Register for FREE

Register Me for FREE





We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail (Sherif, Sergei), or tweet it at our Twitter account.

  • N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)
  • Secure Code review
  • (ISC)2 CSSLP introduction
  • Metasploit introduction
  • Web Application Forensics
  • xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)
  • HTML5 - What's new for security specially for Offline Applications
  • Web 2.0 Security Evolution - How security challenges are changing with technology evolultion
  • ASP.NET MVC Security for WebForms Developers
  • Hack proofing your web application by using reverse engineering
  • Using Windows Communication Foundation (WCF) Securely in your applications