This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Boulder"
Line 1: | Line 1: | ||
− | |||
{{Chapter Template|chaptername=Boulder|extra=The chapter leaders are [mailto:[email protected] Andy Lewis],[mailto:[email protected] Kathy Thaxton], and [mailto:[email protected] Jeremy Martinez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-boulder|emailarchives=http://lists.owasp.org/pipermail/owasp-boulder}} | {{Chapter Template|chaptername=Boulder|extra=The chapter leaders are [mailto:[email protected] Andy Lewis],[mailto:[email protected] Kathy Thaxton], and [mailto:[email protected] Jeremy Martinez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-boulder|emailarchives=http://lists.owasp.org/pipermail/owasp-boulder}} | ||
Line 6: | Line 5: | ||
== '''Next Meeting''' == | == '''Next Meeting''' == | ||
− | === | + | === Web Application Security: Hacking 101 === |
− | at | + | Few can argue that web applications present a significant threat of attacks for State Government Organizations. |
+ | |||
+ | In fact Gartner research indicates that 75% of today’s attacks occur at the application level and 80% of organizations will experience an application security incident by 2010. | ||
+ | Cost of the data breach at TJX soars to $256M, Boston Globe—August 2007 | ||
+ | Monster says data loss involved 1.3 million names, Reuters—August 2007 | ||
+ | Credit Card Information Stolen from State of Indiana’s website, InfoWeek—January 2007 | ||
− | + | Are you confident this won’t happen to you? | |
− | + | This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified. | |
− | + | In this session, you will learn about: | |
− | + | * The importance of web application security – today's most significant online threat | |
+ | * The three most common web application attacks – how they occur, and what can be done to prevent them | ||
+ | * Manual versus automated approaches for scanning and identifying web application vulnerabilities | ||
+ | * How IBM Rational AppScan, an automated vulnerability scanner, can help you automate more of what you are doing manually today | ||
+ | * Best practices for fixing vulnerabilities once they have been identified | ||
+ | * Making web application security part of the entire development lifecycle | ||
=== Agenda === | === Agenda === | ||
+ | Please join the Boulder OWASP Chapter on Thursday, February 19, 2009 at Staples for a presentation by Martin Stenkilde, IBM Rational Certified Senior IT Specialist. This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified. | ||
+ | |||
+ | |||
+ | We will also be taking nominations for a new Chapter Chair or Co-Chairs and will vote at our April meeting. No meeting in March in lieu of SnowFROC on March 5th. Please see the conference website at http://snowfroc.com for all the details and to register. Registration is *FREE* but mandatory to ensure we don't oversubscribe venue capacity. | ||
+ | |||
+ | |||
+ | === Directions to Staples: === | ||
+ | |||
+ | |||
+ | http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title | ||
+ | |||
+ | |||
+ | Agenda: | ||
+ | |||
+ | 6 to 6:40 Dinner | ||
+ | |||
+ | 6:45 to 7pm Chapter Business and nominations for new Chapter Leader | ||
+ | |||
+ | 7pm to 8:15pm Presentation | ||
+ | |||
+ | Sponsor: IBM Rational | ||
+ | Speaker: Martin Stenkilde, IBM Rational Certified Senior IT Specialist | ||
+ | Martin, a native Dane, started his professional career in quality assurance while working for Rational Software's European Headquarter in Amsterdam. Martin also spent time working for Zyntax, a Premier IBM Business Partner, where he functioned as the primary Performance and Security Testing Consultant for 5 years. Martin then joined the IBM Rational Specialty team, and is a certified IBM Test Manager, WebSphere Solutions Specialist, ISEB Professional, and holds a master certification from the Open Group. | ||
+ | |||
* 6pm: Pizza & pop @ [http://maps.google.com/maps?f=q&hl=en&geocode=&q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&sll=39.935803,-105.13092&sspn=0.077395,0.144711&ie=UTF8&ll=39.926934,-105.126565&spn=0.009676,0.018089&z=16&iwloc=A Staples CE - Broomfield] courtesy of [http://www.dirsec.com/ DirSec] | * 6pm: Pizza & pop @ [http://maps.google.com/maps?f=q&hl=en&geocode=&q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&sll=39.935803,-105.13092&sspn=0.077395,0.144711&ie=UTF8&ll=39.926934,-105.126565&spn=0.009676,0.018089&z=16&iwloc=A Staples CE - Broomfield] courtesy of [http://www.dirsec.com/ DirSec] | ||
* 6:30pm: Introduction and Chapter business | * 6:30pm: Introduction and Chapter business | ||
* 6:45pm --> 8pm: CTF | * 6:45pm --> 8pm: CTF | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
=== Logistics === | === Logistics === | ||
Line 111: | Line 149: | ||
== Notes From Previous Meetings == | == Notes From Previous Meetings == | ||
+ | |||
+ | === ''2009 meetings'' === | ||
+ | === First Meeting of 2009 - Thursday, '''January 22nd''', 2009 at [https://www.cexp.com Staples CE - Broomfield] (formerly Corporate Express's US Headquarters)=== | ||
+ | at [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title 1 Environmental Way, Broomfield, CO 80021]. | ||
+ | |||
+ | === AppSec Capture the Flag === | ||
+ | The Boulder OWASP chapter is pleased to present the [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf CTF from the New York Appsec 2008 conference]. The CTF is a series of 30 or so "challenges" which demonstrate commonly found software vulnerabilities. | ||
+ | |||
+ | The purpose of the CTF is twofold. Advanced users can test their AppSec acumen by tackling the challenges on their own. Beginning users can learn AppSec fundamentals as they are guided through the challenges by the friendly chapter leaders and advanced users. | ||
+ | |||
+ | Whilst seemingly technical in nature, the CTF will also be of interest to managers, developers and executives, as it provides a simple way to demonstrate and communicate the serious impact of many AppSec vulnerabilities. | ||
+ | |||
+ | |||
=== [[October 2008: Alex Smolen: the ASP .NET ESAPI]] === | === [[October 2008: Alex Smolen: the ASP .NET ESAPI]] === |
Revision as of 21:58, 13 February 2009
- 1 OWASP Boulder
- 2 Participation
- 3 Sponsorship/Membership
- 4 Next Meeting
- 5 SnowFROC 5 March 2009
- 6 Local News
- 7 What's a Typical Agenda for the Chapter?
- 8 What should I expect to see at a bOWASP meeting?
- 9 Notes From Previous Meetings
- 9.1 2009 meetings
- 9.2 First Meeting of 2009 - Thursday, January 22nd, 2009 at Staples CE - Broomfield (formerly Corporate Express's US Headquarters)
- 9.3 AppSec Capture the Flag
- 9.4 October 2008: Alex Smolen: the ASP .NET ESAPI
- 9.5 FROCo8 Slides - FRONT RANGE OWASP CONFERENCE 2008
- 9.6 2008 Meeting Notes
- 9.7 2007 Meeting Notes
- 10 Chapter Leader Links
OWASP Boulder
Welcome to the Boulder chapter homepage. The chapter leaders are Andy Lewis,Kathy Thaxton, and Jeremy Martinez
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
<paypal>Boulder</paypal>
Next Meeting
Web Application Security: Hacking 101
Few can argue that web applications present a significant threat of attacks for State Government Organizations.
In fact Gartner research indicates that 75% of today’s attacks occur at the application level and 80% of organizations will experience an application security incident by 2010. Cost of the data breach at TJX soars to $256M, Boston Globe—August 2007 Monster says data loss involved 1.3 million names, Reuters—August 2007 Credit Card Information Stolen from State of Indiana’s website, InfoWeek—January 2007
Are you confident this won’t happen to you? This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified.
In this session, you will learn about:
* The importance of web application security – today's most significant online threat * The three most common web application attacks – how they occur, and what can be done to prevent them * Manual versus automated approaches for scanning and identifying web application vulnerabilities * How IBM Rational AppScan, an automated vulnerability scanner, can help you automate more of what you are doing manually today * Best practices for fixing vulnerabilities once they have been identified * Making web application security part of the entire development lifecycle
Agenda
Please join the Boulder OWASP Chapter on Thursday, February 19, 2009 at Staples for a presentation by Martin Stenkilde, IBM Rational Certified Senior IT Specialist. This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified.
We will also be taking nominations for a new Chapter Chair or Co-Chairs and will vote at our April meeting. No meeting in March in lieu of SnowFROC on March 5th. Please see the conference website at http://snowfroc.com for all the details and to register. Registration is *FREE* but mandatory to ensure we don't oversubscribe venue capacity.
Directions to Staples:
http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title
Agenda:
6 to 6:40 Dinner
6:45 to 7pm Chapter Business and nominations for new Chapter Leader
7pm to 8:15pm Presentation
Sponsor: IBM Rational Speaker: Martin Stenkilde, IBM Rational Certified Senior IT Specialist Martin, a native Dane, started his professional career in quality assurance while working for Rational Software's European Headquarter in Amsterdam. Martin also spent time working for Zyntax, a Premier IBM Business Partner, where he functioned as the primary Performance and Security Testing Consultant for 5 years. Martin then joined the IBM Rational Specialty team, and is a certified IBM Test Manager, WebSphere Solutions Specialist, ISEB Professional, and holds a master certification from the Open Group.
- 6pm: Pizza & pop @ Staples CE - Broomfield courtesy of DirSec
- 6:30pm: Introduction and Chapter business
- 6:45pm --> 8pm: CTF
Logistics
In order to participate in the CTF "hands on" you will need to bring a wifi equipped laptop. Many of the challenges in the CTF can be solved without any special tools. However, for those challenges that require tools, we recommend the OWASP LiveCD. Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined. We will have LiveCD copies on hand at the meeting also.
Prizes
We are working with DirSec to coordinate prizes for both the first place advanced user as well as the "most improved" novice user.
Regrets
If you can't make the CTF session on Wednesday, no worries! Denver OWASP will be hosting the CTF session the previous night, on Wednesday 21 January 2009 at Raytheon Polar in Centennial, CO. See the Denver OWASP page for more info!
Following the meeting we will have informal discussions over beverages at the Gordon Biersch Brewery and Restaurant.
SnowFROC 5 March 2009
See the planning page for up-to-the minute details
Local News
Lab Design Wiki
Info and Wish List for the lab - feel free to edit...
Colorado OWASP Chapter Leaders Asked to Speak at ISACA Meeting
David Campbell moderated a panel discussion; Andy was on the panel. Here's what it was about:
We will have a panel to discuss the problems, challenges, and successes when working to integrate business needs between the Audit, Security, and Compliance IT functional groups. These groups sometimes seem to work at cross-purposes, and to some business units, these IT groups are at odds with day-to-day business objectives. The panelists will present anecdotes and events to demonstrate challenges and successes in current and previous positions. We will also have an extended Q&A and will be soliciting your input. If you have questions or areas you would like covered, please email the Education VP ahead of time at education AT isaca-denver D0T org
Panelists: Jim Dillon, IT Audit view Doug Staubach, IT Compliance view Andy Lewis, IT Security view David Campbell, Moderator
Jeremy Martinez Joins bOWASP Leadership
Jeremy has been at every bOWASP meeting since its inception in Sept 2007 and has volunteered to take on some of the responsibilities for keeping the chapter going. Welcome Jeremy!
PCI DSS 6.6 and 11.3 Clarification Issued
Speaking of web app security...
Clarification WRT PCI requirement 6.6 - WAFs and Code Reviews for PCI compliance.
Clarification WRT PCI requirement 11.3 - pen-testing.
4/14/2008 - Interesting File Download Injection research from Jeff Williams of Aspect Security.
4/1/2008 Yes! There's an April meeting! List-server FUBAR; switching to manual We've been having trouble with our list server. The last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!
2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush). More info info to follow later...
How do I learn more about input validation?
Some PHP Security Resources
There seem to be dang few PHP security resources. Please edit this wiki if you've got some good ones. In the mean time, here's some stuff that looks pretty good: PHP meets the Top Ten (c2006)
Fortify's "RAT" is a free tool for static code analysis...
SPI Dynamics to Speak at Feb's Chapter Meeting
Derek Zunker, my local HP rep, has volunteered to sponsor February's meeting, including providing a speaker from SPI Dynamics on February 21st.
New OWASP Tools Available - Jan 2008
Four new OWASP tools are available. OWASP Enterprise Security API helps organizations get organized about application security, OWASP CSRFTester tests for CSRF flaws, OWASP CSRFGuard stops CSRF attacks, and the fantastic new Anti-Samy component allows safe posting of rich content.
What's a Typical Agenda for the Chapter?
6-6:30 - pizza and beverages provided by a sponsor
6:30-6:40 - intro to OWASP and Chapter Business
6:40-7:35'ish - presentation, demonstration, or workshop
7:35'ish - Q & A
after Q & A - adjourn to less formal environment
What should I expect to see at a bOWASP meeting?
Each speaker will be encouraged to cover:
- demonstration of the threat ( "look! I got EVERYONE'S credit card #!") - overview/sample of vulnerable code, preferably in PHP, Java, or .Net env. - some details regarding how to correct the code - some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC - additional tools and references
Notes From Previous Meetings
2009 meetings
First Meeting of 2009 - Thursday, January 22nd, 2009 at Staples CE - Broomfield (formerly Corporate Express's US Headquarters)
at 1 Environmental Way, Broomfield, CO 80021.
AppSec Capture the Flag
The Boulder OWASP chapter is pleased to present the CTF from the New York Appsec 2008 conference. The CTF is a series of 30 or so "challenges" which demonstrate commonly found software vulnerabilities.
The purpose of the CTF is twofold. Advanced users can test their AppSec acumen by tackling the challenges on their own. Beginning users can learn AppSec fundamentals as they are guided through the challenges by the friendly chapter leaders and advanced users.
Whilst seemingly technical in nature, the CTF will also be of interest to managers, developers and executives, as it provides a simple way to demonstrate and communicate the serious impact of many AppSec vulnerabilities.
October 2008: Alex Smolen: the ASP .NET ESAPI
FROCo8 Slides - FRONT RANGE OWASP CONFERENCE 2008
Here are the links to the available presentations from FROCo8:
Jeremiah Grossman Business Logic Flaws - 7 Deadly Sins Media:FROCo8_JeremiahGrossman_BizLogicFlaws.pdf
Akshay Aggarwal Application Security Kung-Fu Competitive Advantage from Threat Modeling Media:ApplicationSecurityKungFuByAkshayAggarwal-FrontRangeOWASP-10Jun08.pdf
Robert Hansen Web Browser (In)Security
Mike Zusman SSL VPN Security Blog post containing slides
More info about the event
2008 Meeting Notes
Black Box vs White Box Testing by John Dickson of Denim Group, Ltd. (Sept 2008)
Static Analysis Techniques for Testing Application Security by Dan Cornell of The Denim Group (Aug 2008)
Grendel-Scan presentation and ISO (David Byrne and Eric Duprey, July 2008).
XSS by David Campbell and Eric Duprey (May 2008)
Ryan C. Barnett's Dynamic Vulnerability Identification - Continuous Web Application Assessment (April 2008)
Michael Sutton's "SQL Injection Revisited" (Feb 2008)
Aman Garg - Web App Protection, Tips for QA and Testing (January 2008)
2007 Meeting Notes
Patrick White, Aspect-Oriented Programming (Nov 2007)
Chapter Leader Links
2009 Colorado Planning Page
Colorado 2009 PLANNING PAGE
Board Members
Andy Lewis (Founder)
Kathy Thaxton (Events Director)
Jeremy Martinez (Board Member)
Pizza Delivery At Corporate Express
1. Pizza Hut (303) 466-2367 6445 W 120th Ave, Broomfield, CO 80020
2. Papa John's 5160 W 120TH AVE Broomfield, CO 80020-3305
Phone: (303)469-6262
Distance: 4.07 miles
menu as of 4/17/2008
3. Richie's Neighborhood Pizzeria (720) 887-3434 DON'T KNOW IF THEY DELIVER but they're in FlatIrons mall.
OWASP Threat Risk Modeling guidelines
Well-written, well-referenced SQL injection article
https://www.owasp.org/index.php/About_OWASP
https://www.owasp.org/index.php/How_OWASP_Works
https://www.owasp.org/index.php?title=How_OWASP_Works&diff=22690&oldid=15689 (this is a previous version of the 'How OWASP Works' page which contains some ideas about the future)
https://www.owasp.org/index.php/OWASP_brand_usage_rules
https://www.owasp.org/index.php/Chapter_Rules
https://www.owasp.org/index.php/Chapter_Leader_Handbook
https://www.owasp.org/index.php/Category:Chapter_Resources
http://www.owasp.org/index.php/Tutorial#Editing_OWASP
And finally, if you haven't seen this amazing page created by Sebastien a while back with descirptions and links to past OWASP presentations, you must check it out now: http://www.owasp.org/index.php/OWASP_Education_Presentation
Of particular interest: https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc
Click here to post events on the OWASP Community calendar
Recruiting Tips - if you need to hire a WebAppSec or AppSec specialist
1. Join this chapter's mailing list and publish to the chapter.
2. Publish to Security Focus's jobs list.
3. Publish to the Yahoo CISSP-jobs list.
4. Publish to local job boards such as RMIUG-Jobs
5. Show up at a meeting, schmooze, and let it be known during the pizza or chapter business portion that YOU ARE HIRING.
6. Include the term OWASP in your ad to make it easily searchable by likely candidates. Consider verbage like:
- Ability to write code to reduce OWASP Top 10 bugs
- Ability to test code for OWASP Top 10 bugs
- Ability to manage Development Teams to adhere to OWASP guidelines