This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Minneapolis St Paul"

From OWASP
Jump to: navigation, search
Line 24: Line 24:
 
== OWASP-MSP Upcoming Chapter Meeting  ==
 
== OWASP-MSP Upcoming Chapter Meeting  ==
  
'''When:''' Wednesday, August 24th @ 6:00
+
'''When:''' Wednesday, September 21st @ 6:00
  
 
'''Where:'''  
 
'''Where:'''  
Line 31: Line 31:
 
St. Paul, MN
 
St. Paul, MN
  
'''Presentation:''' Practical Identity Access Managment: Lessons from the Field
+
'''Presentation:''' The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP: Attack Surface, Backdoors, and Configuration
  
'''Presenter:''' John Benninghoff
+
'''Presenter:''' Dan Cornell
  
 
'''Detail:'''  
 
'''Detail:'''  
  
Building Identity Access Management solutions can be difficult. This presentation reviews lessons learned from designing and building IAM solutions in multiple states, focusing on the unique challenges of IAM in government, which must serve the needs of three separate groups: the public, government agencies, and NGOs. Lessons drawn from real-world experiences will demonstrate what works, what doesn’t, and how to fix things when they go wrong.
+
There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.
  
Following the flow of a typical user’s experience, the presentation will cover the successes, and failures of designing an IAM solution: getting a user ID, logging in to the system, matching “me” as a public user to “my data,” and getting access to the system. Along the way, we will explore lessons about how design choices for each step can impact that experience.  
+
This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.
  
Also covered are designs that were not implemented, sharing the vision of how automated user-driven access requests, changes, and reviews can both improve user experience and lower costs.
+
Bio:
  
Desired Learning Outcomes
+
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application vulnerability management platform.
 
 
This talk will include real-world lessons on:
 
 
 
• Selection of IAM products
 
 
 
• Why people might have 3 (or more) user IDs, and why that’s good
 
 
 
• Single Sign-On protocols, including SAML
 
 
 
• Why controlling usernames is so important, and how usernames can cause problems
 
 
 
• The critical differences between a “user” and a “person”
 
 
 
• What “identity matching” is and how it relates to IAM
 
 
 
• When and how to verify a user’s identity
 
 
 
• How IAM can be used to integrate multiple systems with separate authorization databases
 
 
 
• Managing the costs of public users
 
 
 
John Benninghoff has a diverse background in Information Security as an employee and consultant in financial services, retail, and government. John currently leads the Application Security program at a large healthcare company.
 
 
 
John began his information security career when he was asked to build and deploy a Network IDS using free software (SHADOW) after returning from a SANS conference in 1998. John has experience in security policy, program management, identity management, compliance, and application security, and speaks at national and regional security conferences on a variety of topics.
 
  
 
<!--
 
<!--
 
'''Not sure if you are a current member?''' [https://docs.google.com/spreadsheets/d/142z7ByBQYMrszB1CGD30UC_XHpVX6zwvrkOgse5VO1Y/edit?usp=sharing Member Directory]
 
'''Not sure if you are a current member?''' [https://docs.google.com/spreadsheets/d/142z7ByBQYMrszB1CGD30UC_XHpVX6zwvrkOgse5VO1Y/edit?usp=sharing Member Directory]
 
-->
 
-->
'''REGISTRATION LINK:''' [https://www.eventbrite.com/e/owasp-msp-august-2016-chapter-meeting-tickets-27002918456 Eventbrite Signup Link for Event]
+
'''REGISTRATION LINK:''' [https://www.eventbrite.com/e/owasp-msp-september-2016-chapter-meeting-tickets-27533084196 Eventbrite Signup Link for Event]
  
 
<!--  
 
<!--  

Revision as of 13:30, 6 September 2016

OWASP Minneapolis-St. Paul (OWASP MSP)

Welcome to the Minneapolis-St. Paul (OWASP MSP) chapter homepage. The chapter leadership team includes Alex Bauert - President, Todd Dahl, and Lorna Alamri.

We use Meetup.com for announcements and sometimes, depending on the event Eventbrite.com for RSVP's to organize events and meetings. 


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG



Corporate Sponsors

      Advance it minnesota logo.png
      Best Buy logo.jpg
      FICO

OWASP-MSP Upcoming Chapter Meeting

When: Wednesday, September 21st @ 6:00

Where: Ewald Conference Center 1000 Westgate Drive #252 St. Paul, MN

Presentation: The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP: Attack Surface, Backdoors, and Configuration

Presenter: Dan Cornell

Detail:

There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.

This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.

Bio:

A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application vulnerability management platform.

REGISTRATION LINK: Eventbrite Signup Link for Event



Content

Igor Matlin - Warning: Security Storms are Brewing in Your JavaScript - OWASP (MSP) - May 2015


Secure360

Secure360 is an annual conference providing high quality educational sessions and networking opportunities while working to identify developing trends in risk management, physical security, governance, audit, information security, contingency planning and human capital.

DC612 Meetings

DC612 meets the 2nd Thursday of the month.
http://www.dc612.org/

President: Alex Bauert

Leadership Team: Todd Dahl

Leadership Team: Lorna Alamri

Board Oversight: David Bryan

Content and Social Media: [Eric]

Secure360 Representative: Alex Crittenden