This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "New Jersey"

From OWASP
Jump to: navigation, search
(Meeting News)
m (Meeting News)
Line 83: Line 83:
  
 
'''TOPIC D: KARMA '''  
 
'''TOPIC D: KARMA '''  
This presentation will discuss and demonstrate [http://www.theta44.org/main.html#about KARMA ]an  
+
This presentation will discuss and demonstrate [http://www.theta44.org/karma/index.html KARMA ]an  
 
open-source assessment framework that demonstrates this risk with a modified wireless driver that responds as any network that a client may be looking for, a set of rogue services to capture client  
 
open-source assessment framework that demonstrates this risk with a modified wireless driver that responds as any network that a client may be looking for, a set of rogue services to capture client  
 
credentials, and client-side exploits and discuss other wireless client security issues including the vulnerabilities revealed in some wireless drivers such as the one demonstrated at BlackHat by David Maynor and Johnny Cache.
 
credentials, and client-side exploits and discuss other wireless client security issues including the vulnerabilities revealed in some wireless drivers such as the one demonstrated at BlackHat by David Maynor and Johnny Cache.
Line 90: Line 90:
  
  
'''TOPIC E: Incident Response '''  
+
'''TOPIC E: INCIDENT RESPONSE '''  
7-Things you need to know to respond to respond effectively to a computer security incident at your organization.  This talk will cover both network and web applications
+
After this meeting, our final speaker will cover 7-Things you need to know to respond to respond effectively to a computer security incident at your organization.  This talk will cover both wireless, wired and applications.
 
 
Speaker: Incident Response
 
  
 +
<hr>
  
 
Unoffical XMas Party ;) ''' [http://www.dorrians.com/jc/priv.html DORRIANS]
 
Unoffical XMas Party ;) ''' [http://www.dorrians.com/jc/priv.html DORRIANS]
 
Just several doors down from the meeting is DORRIANS, take this time to raise a toast with your peers and plan OWASP talks, elections, locations and speakers for 2007'
 
Just several doors down from the meeting is DORRIANS, take this time to raise a toast with your peers and plan OWASP talks, elections, locations and speakers for 2007'
  
For any questions or to volunteer place call 973-296-3862
+
For any questions or to volunteer simply call 973-296-3862 to discuss.

Revision as of 00:04, 6 September 2006

OWASP New Jersey

Welcome to the New Jersey chapter homepage. The chapter leaders are: Professor Osama Eljabri, Thomas Brennan, Tom Ryan and Joe Bernik - contact 973-296-3862 if you have any questions.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Meeting News

OWASP NJ SEPTEMBER 25th MEETING RSVP

WHEN: September 25th 2006 5:00pm - 9:00pm

WHERE: New Jersey Institute of Technology GITC Building 3rd Floor, University Heights Newark, New Jersey 07102-1982 DIRECTIONS

EVENT SPONSORS Location Sponsor: New Jersey Institute of Technology

Corporate Sponsors: Mirage Networks and AccessIT Group

* CAFFEINE-ENRICHED TECH FUEL WILL BE SERVED + PIZZA *


TOPIC A: ENDPOINT CONTROL This talk will focus on basic components/capabilities of controling the endpoints in the network and the developing standards that you should be aware of. Speaker: Larry Fermi


TOPIC B: SESSION MANAGEMENT This talk will highlight of weaknesses in 3rd party token generation algorithms, session fixation and weaknesses in expiration. Speaker: James Landis


TOPIC C: WIRELESS INSECURITY For enterprises with wireless LAN networks,as well as those without, Wi-Fi brings a new set of security threats that cannot be protected against by your current firewall and VPN security systems. This talk will cover a current wireless computer security vunerability attack vectors and provide a live demo of the problems and the hacks. Round table discussion will follow concerning risk mitigation of the issues for business and personal. Speaker: Anthony Paladino


TOPIC D: OWASP LABRAT Project This talk will provide a updated on LabRat = The first version Application Security Testing CD developed with the OWASP project leader: Joshua Perrymon. Download the Alpha ISO and burn a copy LABRAT. Be sure to bring it with you to the event. Speaker: Tom Brennan


PLEASE RSVP FOR THIS EVENT - RSVP

Meeting News

OWASP NJ DECEMBER 7th MEETING

WHEN: December 7th 2006 5:30pm - 9:30pm

WHERE: ABN AMRO Bank 499 Washington Ave., (1st Floor) Jersey City, NJ 07310

EVENT SPONSORS Location Sponsor: ABN AMRO

Corporate Sponsors: TBD - call 973-296-3862



TOPIC A: The Rules of Information Security Has Changed The Gunny currently serves on the operations staff of the New York Naval Guard as a subject matter expert on cyber warfare, counter-terrorism, communications and intelligence services. Gunny also serves on the Executive Advisory Board for Alliance America, a homeland security readiness network initiative.

Speaker: Gunnery Sergeant M. Sedano Reynolds, United States Marine Corps


TOPIC B: Metasploit Framework and Buffer Overflows This talk will cover the Metasploit framework with how-to information and details on using it to exploit systems. Learn tips, tricks

Speaker: Paul Battista


TOPIC C: Hacking The Payment Gateway & Effective Countermeasures Payment gateways give merchants the ability to perform real-time credit card and check authorizations from a website over the Internet. 0-day exploits in the wild will be revealed

Speaker: Tom Ryan


TOPIC D: KARMA This presentation will discuss and demonstrate KARMA an open-source assessment framework that demonstrates this risk with a modified wireless driver that responds as any network that a client may be looking for, a set of rogue services to capture client credentials, and client-side exploits and discuss other wireless client security issues including the vulnerabilities revealed in some wireless drivers such as the one demonstrated at BlackHat by David Maynor and Johnny Cache.

Speaker: Dino Dai Zovi


TOPIC E: INCIDENT RESPONSE After this meeting, our final speaker will cover 7-Things you need to know to respond to respond effectively to a computer security incident at your organization. This talk will cover both wireless, wired and applications.


Unoffical XMas Party ;) DORRIANS Just several doors down from the meeting is DORRIANS, take this time to raise a toast with your peers and plan OWASP talks, elections, locations and speakers for 2007'

For any questions or to volunteer simply call 973-296-3862 to discuss.