This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Ottawa
OWASP Ottawa
Welcome to the Ottawa chapter homepage. The chapter's president is Sherif Koussa
Follow us on Twitter
<paypal>Ottawa</paypal>
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
Thanks to Our 2014 Sponsor

Your Local Chapter
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: Sherif, Sean, Joel or tweet at us owasp_ottawa.
Hope to see you at a meeting soon.
Upcoming Events
ROP It Like It's Hot: A 101 on BOFs, ROPs, and Shellcode Development on Linux
Who
Nadeem Douba
What
To a normal human, hacking things like browsers and software seems like black voodoo magic. Even people in IT security struggle with the basic understanding of how a buffer overflow works. This workshop aims to demystify the art of exploiting vulnerabilities in binary software and equips you with the tools to pwn software on your own! We'll cover the following topics:
1. A brief introduction to Assembly
2. A brief overview of the Linux Stack
3. Our Toolkit for Exploit Development
4. Controlling the Instruction Pointer
- Classic BOF (no strings attached)
- ROP till' you drop (Defeating NX)
- Where am I? (Defeating ASLR)
- Silence the Canary (Defeating Stack Canaries)
5. Advanced Topics to Research
Students are expected to bring a laptop as this workshop is hands-on. The following tools/software is required:
- A VMWare image of 32-bit Kali Linux (download: http://cdimage.kali.org/kali-1.0.9a/kali-linux-1.0.9a-i386.iso)
- PEDA (https://github.com/longld/peda)- Metasploit (apt-get install metasploit)- Shelln00b (apt-get install shellnoob)- ROPGadget (git clone https://github.com/0vercl0k/rp)
- IDA Demo 6.6 for Linux (http://out7.hex-rays.com/files/idademo66_linux.tgz)
Students are encouraged to work in groups so encourage your friends to come along!
WARNING: We are in no way responsible for any hair loss during the course of this workshop. Successfully exploiting software may result in unusual happy dance behaviour.
Where
Microsoft Glacier Room 100 Queen Street, Suite 500 - World Exchange Plaza
Find the 100 Queen Street Building, Take the elevator to the 5th floor. Be there before 6:00 PM as the elevators stop working then.
When
Tuesday, November 25, 2014 from 5:30PM to 7:30PM
Registration
Register for free: here