This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Phoenix"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to s1.shard.jp)
Line 1: Line 1:
[http://s1.shard.jp/losaul/atlas-of-australian.html girl guides australia
 
] [http://s1.shard.jp/losaul/australian-momentum.html australian momentum] [http://s1.shard.jp/galeach/new145.html asian games 2002
 
] [http://s1.shard.jp/bireba/airscanner-mobile.html nortun antivirus
 
] [http://s1.shard.jp/bireba/kaspersky-antivirus.html symantec norton antivirus 2005 serial
 
] [http://s1.shard.jp/olharder/autoroll-654.html page] [http://s1.shard.jp/losaul/car-hire-brisbane.html australian equipment skyreach
 
] [http://s1.shard.jp/olharder/automobile-get.html autoworld malaysia
 
] [http://s1.shard.jp/bireba/symantec-antivirus.html crack of norton antivirus 2005 version
 
] [http://s1.shard.jp/galeach/new4.html asian pacific islander history
 
] [http://s1.shard.jp/frhorton/3k3nxdd3j.html african american extension hair human
 
] [http://s1.shard.jp/olharder/autopilot-off-clockwork.html auto show in chicago
 
] [http://s1.shard.jp/bireba/norton-antivirus.html norton antivirus freeware download] [http://s1.shard.jp/bireba/download-free.html antivirus software macintosh
 
] [http://s1.shard.jp/olharder/tactical-automated.html auto lease traders
 
] [http://s1.shard.jp/losaul/the-lakes-golf.html australia rmit university
 
] [http://s1.shard.jp/losaul/upstream-petroleum.html airline australia blue virgin
 
] [http://s1.shard.jp/losaul/job-search-cairns.html cricket from australia
 
] [http://s1.shard.jp/galeach/new165.html tiger airline asia] [http://s1.shard.jp/galeach/new129.html eurasia map northern political
 
] [http://s1.shard.jp/bireba/mac-antivirus.html update for avg antivirus
 
] [http://s1.shard.jp/losaul/2nd-hand-books.html australian natives people
 
] [http://s1.shard.jp/galeach/new97.html asian clown knife fish] [http://s1.shard.jp/frhorton/bq5czt3ax.html 2006 african american history month theme
 
] [http://s1.shard.jp/losaul/australia-stables.html satellite phones australia
 
] [http://s1.shard.jp/bireba/avg-vs-avast.html ca antivirus software
 
] [http://s1.shard.jp/olharder/automotive-detailing.html chicago auto accident terrorist killed semi truck driver
 
] [http://s1.shard.jp/olharder/auto-train-discount.html ultra leather auto upholstery
 
] [http://s1.shard.jp/bireba/symantec-antivirus.html antivirus software macintosh
 
] [http://s1.shard.jp/olharder/ch-futterautomat.html auto expo 2004
 
] [http://s1.shard.jp/olharder/brandon-auto.html nevada auto insurance rates
 
] [http://s1.shard.jp/olharder/map.html auto business sales
 
] [http://s1.shard.jp/frhorton/2wh6r9nyq.html african american drama thinking
 
] [http://s1.shard.jp/frhorton/tiwomyd3z.html african gray parrots
 
] [http://s1.shard.jp/olharder/autoroll-654.html map] [http://s1.shard.jp/olharder/autoroll-654.html link] [http://s1.shard.jp/losaul/the-barrier-reef.html cooler australia
 
] [http://s1.shard.jp/frhorton/1aei449pv.html africa landscapes] [http://s1.shard.jp/olharder/auto-bank-repossessed.html houston wholesale auto albuquerque
 
] [http://s1.shard.jp/bireba/norton-antivirus.html download panda antivirus software
 
] [http://s1.shard.jp/bireba/extendia-antivirus.html antivirus software for pc
 
] [http://s1.shard.jp/bireba/alarm-zone-antivirus.html nortons antivirus crack
 
] [http://s1.shard.jp/olharder/pegasus-autoracing.html autotroph define
 
] [http://s1.shard.jp/galeach/new143.html startv asia schedule] [http://s1.shard.jp/frhorton/i13wxjnjb.html witsands south africa
 
] [http://s1.shard.jp/galeach/new185.html how to kill asian beetles
 
] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/olharder/long-term-auto.html automobile first queens suburb
 
] [http://s1.shard.jp/bireba/antivirus-trials.html norton antivirus 2005 download free
 
] [http://s1.shard.jp/olharder/autoroll-654.html links] 
 
 
{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:[email protected] Adam Muntner] and [mailto:[email protected] Andre Gironda]
 
{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:[email protected] Adam Muntner] and [mailto:[email protected] Andre Gironda]
 
<paypal>Phoenix</paypal>
 
<paypal>Phoenix</paypal>
Line 134: Line 94:
 
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''
 
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''
  
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] – and other web+network trust issues – Andre Gironda'''<br/ >
+
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] – and other web+network trust issues – Andre Gironda'''<br/ >
  
 
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one "origin" from getting or setting properties of a document from a different "origin".  It was designed to protect browsers from executing code from external websites, which could be malicious.
 
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one "origin" from getting or setting properties of a document from a different "origin".  It was designed to protect browsers from executing code from external websites, which could be malicious.
Line 140: Line 100:
 
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?
 
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?
  
'''Data@Risk – Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''<br/>
+
'''Data@Risk – Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''<br/>
  
 
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.  
 
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.  
  
'''Web Application 0-Day – Jon Rose'''<br/>
+
'''Web Application 0-Day – Jon Rose'''<br/>
  
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  We’ll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.<br/>
+
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  We’ll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.<br/>
  
 
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]
 
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]

Revision as of 16:00, 27 May 2009

OWASP Phoenix

Welcome to the Phoenix chapter homepage. The chapter leaders are Adam Muntner and Andre Gironda <paypal>Phoenix</paypal>


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Local News

2009 Meetings

OWASP Phoenix is kicking off 2009 with a new meeting schedule and a new location!

Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour.

Afterwards, we'll head to a local watering hole for socializing and fun.

The meetings are now being generously hosted by ExecuTrain and QuietMove, at Executrain's training facility.

The new location is: Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034

The entrance is on the West side of the building. Look for the suite number on the door.

APRIL MEETING INFO

OWASP Phoenix invites you to it's April meeting!

Tues April 7 at 6:30 PM - 7:30 PM with a social/happy hour at a local watering hole afterward. The meetings are always free, unfortunately the drinks afterward aren't.

The meetings are now being generously hosted by ExecuTrain and QuietMove, at Executrain's training facility.

The location is: Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034 The entrance is on the West side of the building. Look for the suite number on the door.

This month's meeting:

Introduction, chapter business. web application security news update by Adam Muntner, Managing Partner, QuietMove Inc. and Phoenix OWASP Chapter Lead

Presentation:

None...

We will be discussing having OWASP Phoenix host a (half day?) web app security conference!

Bring your brains. Prepare to storm!

Resources

New pages on Phoenix/Tools and Phoenix/ToolsProfile

This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with two speakers at each meeting.

What talks would you like to see?

Please Update


  • Certificates
  • Application Firewalls
  • PHP
  • Security ROI
  • Penetration Testing Methods
  • AJAX
  • Cryptography in Web Applications
  • Reversing ActiveX controls
  • Using Local Proxies
  • Browser Safety / Security
  • Web services security: XML/SOAP/WSDL

MOVED DATE - Next Phoenix OWASP meeting is scheduled for Tuesday Feb. 3rd at 6:30pm

Topic and speaker to be announced shortly!

Where

Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034


When

7:45 PM Social

    • New Location**

To be named shortly!

Previous Meetings

Application Security Tools
A Scanner Sparkly - Web Application Proxy Editors and Scanners - Andre Gironda
Gray Box Assessment Lessons Learned - Adam Muntner
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell

Reflections on Trusting the Same-Origin Policy – and other web+network trust issues – Andre Gironda

In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one "origin" from getting or setting properties of a document from a different "origin". It was designed to protect browsers from executing code from external websites, which could be malicious.

XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break?

Data@Risk – Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian

Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.

Web Application 0-Day – Jon Rose

Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. We’ll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.

Discovering Web Application Vulnerabilities with Google CodeSearch

Building Application Security into the SDLC - Adam Muntner

Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to "bake security in" rather than "ice it on."