This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Minneapolis St Paul"

From OWASP
Jump to: navigation, search
Line 28: Line 28:
 
== OWASP-MSP Upcoming Chapter Meeting  ==
 
== OWASP-MSP Upcoming Chapter Meeting  ==
  
'''When:''' Wednesday, September 21st @ 6:00
+
'''When:''' Wednesday, October 26th @ 6:00
  
 
'''Where:'''  
 
'''Where:'''  
Line 35: Line 35:
 
St. Paul, MN
 
St. Paul, MN
  
'''Presentation:''' The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP: Attack Surface, Backdoors, and Configuration
+
'''Presentation:''' Depending on Vulnerable Libraries
  
'''Presenter:''' Dan Cornell
+
'''Presenter:''' Jeremy Long
  
 
'''Detail:'''  
 
'''Detail:'''  
  
There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.
+
Java applications built today use several third-party libraries and frameworks. We depend on these building blocks so we can build applications faster. However, if one of the libraries we depend on has a known, published vulnerability, then our application may have inherited that vulnerability. This session covers the OWASP Dependency-Check project. It discusses how the tool works and how you can integrate it into your application build process to validate whether or not your application is using known vulnerable libraries.
 
 
This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.
 
  
 
Bio:
 
Bio:
  
A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application vulnerability management platform.
+
Jeremy is a senior information security engineer for a large financial institution. Jeremy specializes in securing the SDLC. He has a deep understanding of static analysis and has created and customized SAST tools to both decrease assessment time and increase quality. Jeremy is the founder and project lead on OWASP's dependency-check.
  
 
<!--
 
<!--
 
'''Not sure if you are a current member?''' [https://docs.google.com/spreadsheets/d/142z7ByBQYMrszB1CGD30UC_XHpVX6zwvrkOgse5VO1Y/edit?usp=sharing Member Directory]
 
'''Not sure if you are a current member?''' [https://docs.google.com/spreadsheets/d/142z7ByBQYMrszB1CGD30UC_XHpVX6zwvrkOgse5VO1Y/edit?usp=sharing Member Directory]
 
-->
 
-->
 +
<!--
 
'''REGISTRATION LINK:''' [https://www.eventbrite.com/e/owasp-msp-september-2016-chapter-meeting-tickets-27533084196 Eventbrite Signup Link for Event]
 
'''REGISTRATION LINK:''' [https://www.eventbrite.com/e/owasp-msp-september-2016-chapter-meeting-tickets-27533084196 Eventbrite Signup Link for Event]
 
+
-->
 
<!--  
 
<!--  
 
== OWASP-MSP Upcoming Chapter meeting  ==
 
== OWASP-MSP Upcoming Chapter meeting  ==
Line 136: Line 135:
  
 
'''Leadership Team:''' [mailto:[email protected] Todd Dahl]
 
'''Leadership Team:''' [mailto:[email protected] Todd Dahl]
 
+
<!--
 
'''Leadership Team:''' [mailto:[email protected] Lorna Alamri]  
 
'''Leadership Team:''' [mailto:[email protected] Lorna Alamri]  
 
+
-->
  
 
<headertabs />  
 
<headertabs />  

Revision as of 13:01, 19 November 2016

OWASP Minneapolis-St. Paul (OWASP MSP)

Welcome to the Minneapolis-St. Paul (OWASP MSP) chapter homepage. The chapter leadership team includes Alex Bauert - President and Todd Dahl.

We use Meetup.com for announcements and sometimes, depending on the event Eventbrite.com for RSVP's to organize events and meetings. 


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG



Corporate Sponsors

      FICO

OWASP-MSP Upcoming Chapter Meeting

When: Wednesday, October 26th @ 6:00

Where: Ewald Conference Center 1000 Westgate Drive #252 St. Paul, MN

Presentation: Depending on Vulnerable Libraries

Presenter: Jeremy Long

Detail:

Java applications built today use several third-party libraries and frameworks. We depend on these building blocks so we can build applications faster. However, if one of the libraries we depend on has a known, published vulnerability, then our application may have inherited that vulnerability. This session covers the OWASP Dependency-Check project. It discusses how the tool works and how you can integrate it into your application build process to validate whether or not your application is using known vulnerable libraries.

Bio:

Jeremy is a senior information security engineer for a large financial institution. Jeremy specializes in securing the SDLC. He has a deep understanding of static analysis and has created and customized SAST tools to both decrease assessment time and increase quality. Jeremy is the founder and project lead on OWASP's dependency-check.



Content

You can find our Chapter Videos at https://vimeo.com/user56799697



Secure360

Secure360 is an annual conference providing high quality educational sessions and networking opportunities while working to identify developing trends in risk management, physical security, governance, audit, information security, contingency planning and human capital.

DC612 Meetings

DC612 meets the 2nd Thursday of the month.
http://www.dc612.org/

President: Alex Bauert

Leadership Team: Todd Dahl