This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Boulder"
(→Passive Web Application Defect Identification Using ModSecurity) |
(→Chapter Leader Links) |
||
Line 145: | Line 145: | ||
https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc | https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc | ||
− | + | === Recruiting Tips - if you need to hire a WebAppSec or AppSec specialist === | |
− | + | [http://www.owasp.org/recruitingtips.html Recruiting tips] | |
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 21:38, 11 April 2008
OWASP Boulder
Welcome to the Boulder chapter homepage. The chapter leader is Andy Lewis
Participation
OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Sponsorship/Membership
to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
Next Meeting
Yes! There's an April meeting! List-server FUBAR; switching to manual
We've been having trouble with our list server. The last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!
The next meeting is
Thursday, April 17th, 2008 at Corporate Express's US Headquarters
at 1 Environmental Way, Broomfield, CO 80021.
Passive Web Application Defect Identification
Ryan Barnett of Breach Security will be speaking about how to employ ModSecurity (an open-source web application firewall) and other Web Application Firewalls (WAFs) to identify web application vulnerabilities.
Identifying web application vulnerabilities has traditionally been achieved by running vulnerability scanners. While these tools can been effective, they have some deficiencies, mainly that they are simply snap-shots in time and they often add network load on the web application. Web application firewalls can help to detect application defects in applications by monitoring the application as it is used. In this presentation, Ryan Barnett, Director of Application Security at Breach, will discuss how deploying a web application firewall can provide more value beyond simply protecting applications from attack. Due to their strategic placement within the application's communication stream, web application firewalls, can provide a great deal of visibility into how an application is used and detect defects by watching the interaction between the application and a client.
Updates will be spammed to the Chapter Mailing List.
Agenda:
6-6:30 Dinner (at Corporate Express; pizza provided by Breach Security.
6:30 - 6:40 Chapter business
6:40 - 8:00 Presentation and Q&A
Following the meeting we will have informal discussions over beverages at the Gordon Biersch Brewery and Restaurant.
Ryan C. Barnett
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups.
He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, "Hacker Techniques, Exploits and Incident Handling" course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC).
Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, "Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006.
FRONT RANGE OWASP CONFERENCE 2008 ( FROCo8 )
Save the date! The first ever Front Range OWASP Conference will be held on June 10th at the Auroria Campus. Front Range OWASP Conference (FROCo8), If you're interested in helping or sponsoring please email Kathy Thaxton, the Conference Director... kthaxton AT businesspartnersolutions DOT com or the Project Manager, Dariush Rusta... dariush_rusta AAATTT yahoo Do+ c0m.
Local News
2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush). More info info to follow later...
How do I learn more about input validation?
Some PHP Security Resources
There seem to be dang few PHP security resources. Please edit this wiki if you've got some good ones. In the mean time, here's some stuff that looks pretty good: PHP meets the Top Ten (c2006)
Fortify's "RAT" is a free tool for static code analysis...
SPI Dynamics to Speak at Feb's Chapter Meeting
Derek Zunker, my local HP rep, has volunteered to sponsor February's meeting, including providing a speaker from SPI Dynamics on February 21st.
New OWASP Tools Available - Jan 2008
Four new OWASP tools are available. OWASP Enterprise Security API helps organizations get organized about application security, OWASP CSRFTester tests for CSRF flaws, OWASP CSRFGuard stops CSRF attacks, and the fantastic new Anti-Samy component allows safe posting of rich content.
Member Survey
Please take time to complete the member survey to help improve the value the Chapter brings to the Boulder/Front-Range community.
What's a Typical Agenda for the Chapter?
6-6:30 - pizza and beverages provided by a sponsor
6:30-6:40 - intro to OWASP and Chapter Business
6:40-7:35'ish - presentation, demonstration, or workshop
7:35'ish - Q & A
after Q & A - adjourn to less formal environment
What should I expect to see at a bOWASP meeting?
Each speaker will be encouraged to cover:
- demonstration of the threat ( "look! I got EVERYONE'S credit card #!") - overview/sample of vulnerable code, preferably in PHP, Java, or .Net env. - some details regarding how to correct the code - some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC - additional tools and references
Notes From Previous Meetings
February 2008 Meeting Notes - Michael Sutton - SQL Injection
The sponsor was HP, and the speaker was Michael Sutton of HP/SPI Dynamics. Topics included:
1. Data tampering via SQL injection (verbose and blind)
2. Guidance regarding WHAT TO DO and WHAT RESOURCES ARE AVAILABLE for input validation (aka data validation).
3. SQL injection against AJAX
4. Intro and results of Michael Sutton's FUGGLE project
Michael's slide deck is available in PDF format Sutton:Revisiting SQL Injection
Michael Sutton is the co-author of "Fuzzing : Brute Force Vulnerability Discovery" and the Security Evangelist for SPI Dynamics, recently acquired by HP. Michael is responsible for identifying, researching and presenting on emerging issues in the web application security industry. He is a frequent speaker at major information security conferences, has authored much literature and is regularly quoted in the media on various information security topics. Michael is also a member of the Web Application Security Consortium (WASC), where he is project lead for the Web Application Security Statistics project.
Prior to joining SPI Dynamics, Michael was the Director for iDefense Labs, a team of world class researchers tasked with discovering and researching security vulnerabilities. Michael also established the Information Systems Assurance and Advisory Services (ISAAS) practice for Ernst & Young in Bermuda. He holds degrees from the University of Alberta and The George Washington University.
Aman Garg - Web App Protection, Tips for QA and Testing (January 2008)
2007 Meeting Notes
Patrick White, Aspect-Oriented Programming (Nov 2007)
Chapter Leader Links
Well-written, well-referenced SQL injection article
https://www.owasp.org/index.php/About_OWASP
https://www.owasp.org/index.php/How_OWASP_Works
https://www.owasp.org/index.php?title=How_OWASP_Works&diff=22690&oldid=15689 (this is a previous version of the 'How OWASP Works' page which contains some ideas about the future)
https://www.owasp.org/index.php/OWASP_brand_usage_rules
https://www.owasp.org/index.php/Chapter_Rules
https://www.owasp.org/index.php/Chapter_Leader_Handbook
https://www.owasp.org/index.php/Category:Chapter_Resources
http://www.owasp.org/index.php/Tutorial#Editing_OWASP
And finally, if you haven't seen this amazing page created by Sebastien a while back with descirptions and links to past OWASP presentations, you must check it out now: http://www.owasp.org/index.php/OWASP_Education_Presentation
Of particular interest: https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc