This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Boulder"

From OWASP
Jump to: navigation, search
Line 32: Line 32:
  
 
-----------------------------------------------------------------------
 
-----------------------------------------------------------------------
'''April Meeting - Passive Web Application Defect Identification'''
 
 
[https://www.owasp.org/index.php?title=Boulder&action=submit#Ryan_C._Barnett '''Ryan Barnett'''] of [http://www.breach.com/ Breach Security] will be speaking about how to employ [http://www.modsecurity.org/ ModSecurity] (an open-source web application firewall) and other Web Application Firewalls (WAFs) to identify web application vulnerabilities.
 
 
Identifying web application vulnerabilities has traditionally been achieved by running vulnerability scanners. While these tools can been
 
effective, they have some deficiencies, mainly that they are simply snap-shots in time and they often add network load on the web
 
application. Web application firewalls can help to detect application defects in applications by monitoring the application as it is used. In
 
this presentation, Ryan Barnett, Director of Application Security at Breach, will discuss how deploying a web application firewall can
 
provide more value beyond simply protecting applications from attack.  Due to their strategic placement within the application's communication stream, web application firewalls, can provide a great deal of visibility into how an application is used and detect defects by
 
watching the interaction between the application and a client.
 
 
'''Ryan C. Barnett'''
 
 
Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups.
 
 
He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, "Hacker Techniques, Exploits and Incident Handling" course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC).
 
 
Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, [http://www.amazon.com/Preventing-Attacks-Apache-Ryan-Barnett/dp/0321321286 "Preventing Web Attacks with Apache],” was published by Addison/Wesley in 2006.
 
----
 
  
 
== '''''FROCo8 Slides - FRONT RANGE OWASP CONFERENCE 2008''''' ==  
 
== '''''FROCo8 Slides - FRONT RANGE OWASP CONFERENCE 2008''''' ==  
Line 124: Line 105:
  
 
== Notes From Previous Meetings ==
 
== Notes From Previous Meetings ==
 
+
=== '''''2008 Meeting Notes''''' ===
 
[https://www.owasp.org/index.php/Boulderchaptermeetings2008.html All 2008 meeting notes]
 
[https://www.owasp.org/index.php/Boulderchaptermeetings2008.html All 2008 meeting notes]
  

Revision as of 05:23, 10 July 2008

OWASP Boulder

Welcome to the Boulder chapter homepage. The chapter leader is Andy Lewis


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Next Meeting

Please bring a laptop!

The next meeting is

Thursday, July 17th, 2008 at Corporate Express's US Headquarters

at 1 Environmental Way, Broomfield, CO 80021.

Intro to Grendel - a WebApp PenTesting Tool - BRING A LAPTOP

Blackhat veteran David Byrne and Denver chapter leader Eric Duprey will be presenting their latest work: Grendel!

Grendel is a tool they developed to automate many aspects of appsec testing. During this presentation, they will show how to use Grendel to accelerate webapp pen testing.

Bring a laptop with an optical drive, as a LiveCD will be provided which includes Grendel and a target application.

Developers are encouraged to attend, as Grendel can be used to find many common flaws in applications. We all know that fixing bugs in DEV is significantly cheaper than fixing them after a production penetration test.

Updates will be spammed to the Chapter Mailing List.

Agenda:

6-6:30 Dinner (at Corporate Express; pizza provided by TrustWave.

6:30 - 6:40 Chapter business

6:40 - 8:00 Presentation and Q&A

Following the meeting we will have informal discussions over beverages at the Gordon Biersch Brewery and Restaurant.



FROCo8 Slides - FRONT RANGE OWASP CONFERENCE 2008

Here are the links to the available presentations from FROCo8:

Jeremiah Grossman Business Logic Flaws - 7 Deadly Sins

Media:FROCo8_JeremiahGrossman_BizLogicFlaws.pdf

Akshay Aggarwal Application Security Kung-Fu Competitive Advantage from Threat Modeling

Media:ApplicationSecurityKungFuByAkshayAggarwal-FrontRangeOWASP-10Jun08.pdf


More info about the event

Planning page,

Local News

PCI DSS 6.6 and 11.3 Clarification Issued

Speaking of web app security...

Clarification WRT PCI requirement 6.6 - WAFs and Code Reviews for PCI compliance.

Clarification WRT PCI requirement 11.3 - pen-testing.

4/14/2008 - Interesting File Download Injection research from Jeff Williams of Aspect Security.

4/1/2008 Yes! There's an April meeting! List-server FUBAR; switching to manual We've been having trouble with our list server. The last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!

2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush). More info info to follow later...

How do I learn more about input validation?

Google for Input Validation

Some PHP Security Resources

There seem to be dang few PHP security resources. Please edit this wiki if you've got some good ones. In the mean time, here's some stuff that looks pretty good: PHP meets the Top Ten (c2006)

Fortify's "RAT" is a free tool for static code analysis...

SPI Dynamics to Speak at Feb's Chapter Meeting

Derek Zunker, my local HP rep, has volunteered to sponsor February's meeting, including providing a speaker from SPI Dynamics on February 21st.

New OWASP Tools Available - Jan 2008

Four new OWASP tools are available. OWASP Enterprise Security API helps organizations get organized about application security, OWASP CSRFTester tests for CSRF flaws, OWASP CSRFGuard stops CSRF attacks, and the fantastic new Anti-Samy component allows safe posting of rich content.

Member Survey

Please take time to complete the member survey to help improve the value the Chapter brings to the Boulder/Front-Range community.


What's a Typical Agenda for the Chapter?

6-6:30 - pizza and beverages provided by a sponsor

6:30-6:40 - intro to OWASP and Chapter Business

6:40-7:35'ish - presentation, demonstration, or workshop

7:35'ish - Q & A

after Q & A - adjourn to less formal environment

What should I expect to see at a bOWASP meeting?

Each speaker will be encouraged to cover:

- demonstration of the threat ( "look!  I got EVERYONE'S credit card #!")
- overview/sample of vulnerable code, preferably in PHP, Java, or .Net env.
- some details regarding how to correct the code
- some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC
- additional tools and references


Notes From Previous Meetings

2008 Meeting Notes

All 2008 meeting notes

Ryan C. Barnett's Dynamic Vulnerability Identification - Continuous Web Application Assessment

Michael Sutton's "SQL Injection Revisited" (Feb 2008)

Aman Garg - Web App Protection, Tips for QA and Testing (January 2008)

2007 Meeting Notes

All 2007 Meeting Notes

Patrick White, Aspect-Oriented Programming (Nov 2007)

Jeremiah Grossman, Top 10 Web Attack Techniques, their potential impact, and strategies to protect your company

Chapter Leader Links

Pizza Delivery At Corporate Express

1. Papa John's 5160 W 120TH AVE Broomfield, CO 80020-3305

Phone: (303)469-6262

Delivery Hours: 10:00 am - 11:30 pm

Distance: 4.07 miles

menu as of 4/17/2008

2. Richie's Neighborhood Pizzeria (720) 887-3434 DON'T KNOW IF THEY DELIVER but they're in FlatIrons mall.


Well-written, well-referenced SQL injection article

Cool MS Ace Team Blog

https://www.owasp.org/index.php/About_OWASP

https://www.owasp.org/index.php/How_OWASP_Works

https://www.owasp.org/index.php?title=How_OWASP_Works&diff=22690&oldid=15689 (this is a previous version of the 'How OWASP Works' page which contains some ideas about the future)

https://www.owasp.org/index.php/OWASP_brand_usage_rules

https://www.owasp.org/index.php/Chapter_Rules

https://www.owasp.org/index.php/Chapter_Leader_Handbook

https://www.owasp.org/index.php/Category:Chapter_Resources

http://www.owasp.org/index.php/Tutorial#Editing_OWASP

And finally, if you haven't seen this amazing page created by Sebastien a while back with descirptions and links to past OWASP presentations, you must check it out now: http://www.owasp.org/index.php/OWASP_Education_Presentation

Of particular interest: https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc

Recruiting Tips - if you need to hire a WebAppSec or AppSec specialist

1. Join this chapter's mailing list and publish to the chapter.

2. Publish to Security Focus's jobs list.

3. Publish to the Yahoo CISSP-jobs list.

4. Publish to RMIUG-Jobs

5. Show up at a meeting, schmooze, and let it be known during the pizza or chapter business portion that YOU ARE HIRING.