This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Rochester

From OWASP
Revision as of 00:32, 10 October 2006 by Mstarks01 (talk | contribs)

Jump to: navigation, search

OWASP Rochester

Welcome to the Rochester chapter homepage. The chapter leader is Ralf Durkee


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Local Officers

    • President: Ralf Durkee
    • Vice President: Chris Karr
    • Secretary: Steve Buck
    • Web and Communications: Michael Starks


Meeting Times & Location

Meetings are held the third Monday of every month. Our October meeting will be on Monday, October 16. The meeting location is Bryant and Stratton college, Jefferson Rd, near I-390. Google Map

October Meeting Details

Presentation: The first of the OWASP top ten: unvalidated input, by Steve Buck.

At this meeting we will be discussing the first of the OWASP top ten list: unvalidated input. We will discuss the problems posed by not validating input on the server side. These problems include: forced browsing, command insertion, cross site scripting, buffer overflows, bypassing site security, format string attacks, SQL injection, cookie poisoning, and hidden field manipulation.

We will cover how to determine if you are vulnerable to one of these attacks, and also how to protect yourself. We will also have a demo of some of these exploits in action. Finally, we will have an open discussion with any questions about the subject matter.

Biography

Steve Buck is a consultant for Mindex Technologies. He has been working with various web technologies since 1996, involving everything from Perl and C CGIs to J2EE.

Steve has experience as a UNIX system administrator instructor with a specialty in system security.


Past Presentations

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint