This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Houston"
From OWASP
Line 82: | Line 82: | ||
* '''June 5, 2007 :: Web 2.0''' [http://denimgroup.typepad.com/denim_group/2007/06/owasp_houston_s.html '''Presentation Download''']<br><br>Presentation by [http://denimgroup.typepad.com/denim_group/dan_cornell/index.html Dan Cornell] of the [http://www.denimgroup.com/ Denim Group]. With the integration of new technologies into web application development, there are more security dangers than ever before to be found in the application layer. This session discusses the landscape of web application security, new technologies being used in developing web applications and web services and the implications these have on system security. Technical vulnerabilities in web applications such as SQL injection and cross-site scripting (XSS) will be discussed alongside logical, business-level issues. The evolution of these flaws will be tracked as traditional web applications have expanded to include Web 2.0, AJAX and web services capabilities. The goal of the presentation is to educate developers, project managers and quality assurance personnel about the risks inherent in developing web applications and provide meaningful recommendations for addressing those risks during the software development lifecycle. [http://www.owasp.org/index.php/Category:OWASP_Sprajax_Project Sprajax Download].<br><br> | * '''June 5, 2007 :: Web 2.0''' [http://denimgroup.typepad.com/denim_group/2007/06/owasp_houston_s.html '''Presentation Download''']<br><br>Presentation by [http://denimgroup.typepad.com/denim_group/dan_cornell/index.html Dan Cornell] of the [http://www.denimgroup.com/ Denim Group]. With the integration of new technologies into web application development, there are more security dangers than ever before to be found in the application layer. This session discusses the landscape of web application security, new technologies being used in developing web applications and web services and the implications these have on system security. Technical vulnerabilities in web applications such as SQL injection and cross-site scripting (XSS) will be discussed alongside logical, business-level issues. The evolution of these flaws will be tracked as traditional web applications have expanded to include Web 2.0, AJAX and web services capabilities. The goal of the presentation is to educate developers, project managers and quality assurance personnel about the risks inherent in developing web applications and provide meaningful recommendations for addressing those risks during the software development lifecycle. [http://www.owasp.org/index.php/Category:OWASP_Sprajax_Project Sprajax Download].<br><br> | ||
− | *'''August 8, 2007: Atrysk Security :: [http://www.atrysk.com/ Presentation Download] (go to <b>BLOG</b> -> <b>DOWNLOADS</b>)<br>''' <br> | + | *'''August 8, 2007: Atrysk Security :: [http://www.atrysk.com/ Presentation Download] (go to <b>BLOG</b> -> <b>DOWNLOADS</b>)<br>''' <br>Today, hackers are manipulating Web applications inside the corporate firewall, enabling them to access and sabotage corporate and customer data as we’ve seen with very highly publicized Web hacking events in 2005 such as MySpace.com, Paris Hilton’s T-mobile phone compromise, and the perl.santy worm. Given even a tiny hole in a company’s Web application code, an experienced intruder armed with only a Web browser and a little determination can break into most Web sites. The reality is traditional Internet security is not enough because these methods do not ensure the security of your entire Web presence by checking Web application content (HTML pages, scripts, proprietary applications, cookies, and other Web servers). With the ever-increasing threat of cyber attacks, today’s Web environment has made application security an essential element in the application development lifecycle. We will explain and demonstrate with common Web attacks such as SQL Injection, Cross-Site Scripting (XSS), AJAX [in]Security and Session Hijacking why applications are increasingly at risk of malicious attack because of security defects and how easily they are exploited.<br><br> |
|- | |- | ||
!<br><br> | !<br><br> |
Revision as of 11:54, 13 August 2007
|
Welcome to Houston Chapter |
---|
The Houston Chapter will focus around Web Application Security issues with discussions on application layer vulnerabilties, penetration testing, and secure coding practices within the numerous development languages. Our chapter will meet on the second (2nd) Wednesday of each month and participation in OWASP Houston is free and open to all. Please subscribe to the mailing list for meeting announcements. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in web application security is welcome to attend. We encourage attendees to give short presentations about specific topics. If you would like to make a presentation, or have any questions about the Houston Chapter, send an email to David Nester. Meeting Calendar
|
Chapter Meeting :: August 8, 2007: Atrysk Security |
Geek Food will be provided
|
Past Presentations |
|