This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
m (Updated Slack link.)
 
(18 intermediate revisions by 3 users not shown)
Line 1: Line 1:
<hr />
+
[[File:Rochester_banner.jpg|800px]]
  
 
== Welcome to the OWASP Rochester Local Chapter ==
 
== Welcome to the OWASP Rochester Local Chapter ==
Line 8: Line 8:
 
* [mailto:[email protected] James Keeler]
 
* [mailto:[email protected] James Keeler]
  
== Upcoming Meetings & Events ==
+
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.
 +
 
 +
== Connect With Us ==
 +
 
 +
{| cellspacing="15"
 +
|-
 +
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasprochester]]
 +
| [[Image:meetup-button.png|108px|link=https://www.meetup.com/OWASP-Rochester-Chapter]]
 +
| [[Image:Slack.png|175px|link=https://join.slack.com/t/owasp/shared_invite/enQtNjExMTc3MTg0MzU4LWQ2Nzg3NGJiZGQ2MjRmNzkzN2Q4YzU1MWYyZTdjYjA2ZTA5M2RkNzE2ZjdkNzI5ZThhOWY5MjljYWZmYmY4ZjM]]
 +
|-
 +
|
 +
|
 +
| #chapter-rochester
 +
|}
  
 +
[https://groups.google.com/a/owasp.org/forum/#!forum/rochester-chapter-announce/join Join our announcements mailing list]
 +
 +
[https://groups.google.com/a/owasp.org/forum/#!forum/rochester-chapter/join Join our discussion mailing list]
 +
 +
<meetup group="OWASP-Rochester-Chapter" />
 +
=== Archived events ===
 +
[[Rochester_Meeting_Archive|Visit our archive page for all old event details.]]
 +
 +
=== Last Year's Events ===
 
'''OWASP December 19th Meeting'''
 
'''OWASP December 19th Meeting'''
  
Line 24: Line 46:
 
'''Bio''': Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.
 
'''Bio''': Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.
  
'''Where''': Nixon Peabody, 1300 Clinton Square, 13th floor (free parking underneath the building, bring the ticket to the meeting for validation)
+
'''Where''': Nixon Peabody, 1300 Clinton Square, 14th floor [CORRECTED] (free parking underneath the building, bring the ticket to the meeting for validation)
  
 
'''When''': Wednesday, Dec 19th, 6:00 PM
 
'''When''': Wednesday, Dec 19th, 6:00 PM
  
Please RSVP by Dec 12<sup>th</sup> to [Mailto:[email protected] Ralph Durkee]
+
Please RSVP by Dec 12<sup>th</sup> to Ralph Durkee
  
 
Thank you, Hope to see you there!
 
Thank you, Hope to see you there!
  
== Participation ==
 
 
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others.
 
 
'''Mailing Lists:'''
 
* [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce Announcements]
 
* [http://lists.owasp.org/pipermail/owasp-rochester-ny Discussion]
 
Prior to participating with OWASP please review the [[:Category:Chapter Handbook|Chapter Rules]].
 
 
== Local Officers ==
 
 
<ul>
 
*<b>President:</b> Vacant
 
*<b>Vice President:</b> [mailto:[email protected] Ralph Durkee]
 
*<b>Treasurer:</b> [mailto:[email protected] Ralph Durkee]
 
*<b>Secretary:</b> Appointed by Event Coordinator at each meeting.
 
*<b>Event Coordinator:</b> Vacant
 
*<b>Communications and Chapter OWASP Evangelist:</b> Vacant
 
*<b>Webmaster:</b> [mailto:[email protected] John King]
 
*<b>Mail List Administrator:</b> [mailto:[email protected] John King]
 
</ul>
 
 
== Meeting Dates & Location ==
 
  
<b>Dates:</b> Meetings are announced via the [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce announcement mailing list] and on the website. Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.
 
 
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.
 
 
== Past Events ==
 
 
;;Rochester Security Summit 2018
 
;;Rochester Security Summit 2018
 
Date: Oct 9 & 10, 2018  OWASP AppSec Track:
 
Date: Oct 9 & 10, 2018  OWASP AppSec Track:
Line 111: Line 105:
 
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)
 
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)
  
 +
== Participation ==
  
;Rochester Security Summit 2017
+
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others.
Date: Oct 19-20, 2017
 
  
OWASP Track (day 2):
+
'''Mailing Lists:'''
* Keynote: David Kennedy
+
* [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce Announcements]
* Beyond the Top 10 (John N. King, Mary Beth King)
+
* [http://lists.owasp.org/pipermail/owasp-rochester-ny Discussion]
* How Billion Dollar Enterprises Manage Application Security at Scale (Altaz Valani)
+
Prior to participating with OWASP please review the [[:Category:Chapter Handbook|Chapter Rules]].
* Almost Intractable Application Security Problems… and Solutions (Danny Harris)
 
 
 
 
 
'''Joint OWASP-ISSA Rochester Chapter Meeting'''<br />
 
July 13, 2017<br />
 
6:00pm<br />
 
Nixon Peabody<br />
 
1300 Clinton Square, 14th Floor<br />
 
 
 
'''How Billion Dollar Enterprises Manage Application Security at Scale'''
 
 
 
Security Compass recently completed a research study by surveying companies across multiple industries with the goal of discovering how large, complex organizations address application security at scale.  The majority of respondents surveyed were multinational organizations who reported annual earnings greater than $1 billion USD.  Through this new research study, we have gleamed novel insights on how large organizations manage application security at scale.  Through this presentation, we will reveal aggregated insights, industry trends, and best practices that illuminate how organizations are addressing application security at scale, so that you may apply and compare these learnings to the state of application security at your own organization.
 
 
 
'''Speaker: Altaz Valani'''
 
 
 
Altaz Valani is a Research Director at Security Compass responsible for managing the overall research vision and team.  Prior to joining Security Compass, Altaz was a Senior Research Director in the Application Development Practice at Info-Tech Research Group providing IT managers, directors, and senior managers with guidance and analysis around application development – including Agile, Cloud, Mobile, and the overall SDLC.  His other past positions include Senior Manager at KPMG, and various entrepreneurial and intrapreneurial positions where he worked side by side with senior-level stakeholders at blue chip clients to drive business value through software development.
 
 
Altaz enjoys coding, teaching, and the challenge of learning.  He received his BEng in Computer Engineering from McMaster University, and his MBA from the University of Western Ontario.
 
AltazMAS!
 
 
 
'''Parking'''
 
 
 
Free parking is available underneath the building. Please bring your ticket with you for validation.
 
 
 
Entrance for parking:
 
https://www.google.com/maps/dir/43.1558628,-77.605952/@43.1556506,-77.6077177,17.12z
 
 
 
 
 
'''OWASP Rochester Chapter Event'''
 
March 1, 2017<br />
 
6:00pm to 7:15pm<br />
 
Nixon Peabody<br />
 
1300 Clinton Square, 13th Floor<br />
 
 
 
'''Introduction to Application Security and OWASP Top 10 Risks (part 2 of 2)'''
 
 
 
Want to learn more about the security challenges developers face? This session will provide easy to understand, demo-driven examples of four common application vulnerabilities. You’ll see the attack in action, learn how the attack works, learn how it can be prevented, and watch a successful defensive counter.
 
 
 
This session will be covering the following components of the OWASP Top 10:
 
 
 
* A1 – Injection
 
* A3 – Cross-Site Scripting (XSS)
 
* A8 – Cross-Site Request Forgery (CSRF)
 
* A10 – Unvalidated Redirects and Forwards
 
 
 
The source code used in the demo is freely available and uses a Java/JEE stack.
 
 
 
'''Slides:'''
 
http://www.johnnking.com/slides/owasp2017/
 
 
 
'''Source code:'''
 
https://github.com/JohnNKing/appsecdemo
 
 
 
'''Speaker: John King'''
 
 
 
John is an experienced developer with a special focus on application security, enterprise software, and Agile product development. He’s a Senior Web Programmer / Analyst for RIT, an Officer of the Rochester Chapters of ISSA and OWASP, and has been a contributor to the Rochester Security Summit for the past four years.
 
 
 
 
 
'''OWASP Rochester Chapter Event'''
 
November 18, 2016<br />
 
Noon to 1:15pm<br />
 
RIT, GCCIS<br />
 
GOL-2130 (Air Gap Lab)
 
 
 
'''Introduction to Application Security and OWASP Top 10 Risks (part 1 of 2)'''
 
 
 
Application Security is really hot and very much in demand. Find out why it’s so hot and get an in-depth introduction to application security and 6 of the OWASP Top 10 Application Risks. Ralph will discuss the how-to of the exploits and defenses for:
 
 
 
* A2 – Broken Authentication and Session Management
 
* A4 – Insecure Direct Object References
 
* A5 – Security Misconfiguration
 
* A6 – Sensitive Data Exposure
 
* A7 – Missing Function Level Access Control
 
* A9 – Using Components with Known Vulnerabilities
 
 
 
;Slides [[Media:Durkee_OWASP_Top_10_2016_11_v11.pdf]]
 
 
 
'''Speaker: Ralph Durkee'''
 
 
 
Ralph is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit. He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in advanced penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 & SEC504 – Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, GPEN and GXPN.
 
;
 
;Rochester Security Summit 2016
 
Date: Oct 5-6, 2016
 
 
 
OWASP Track (day 2):
 
* Keynote: Jeremiah Grossman
 
* Introduction to Application Security and OWASP Top 10 Risks (Ralph Durkee & John King)
 
* Common Developer Crypto Mistakes (Kevin W. Wall)
 
* #DevOpsSec – Killing the Buzz? (Jason Ross)
 
* Web Application Firewall Evaluation with DevOps, SDLC and the New OWASP Core Rule Set (Chaim Sanders)
 
 
 
;
 
;OWASP Rochester Social Event (8/11/16, MacGregors')
 
Please join the Rochester OWASP chapter for a social event August 11th at MacGregors' in Henrietta.
 
 
 
Come out and discuss your favorite topics in application security! Appetizers will be provided.
 
 
 
When: Thursday, August 11 at 5:30pm
 
 
 
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)
 
 
 
;
 
;Understanding and Preventing Cross-Site Request Forgery Attacks
 
Date:  Feb 10th, 12 Noon - 1:30pm
 
Location: Univ of Rochester College Town – Building 3
 
;Speaker: John King
 
;Slides http://www.johnnking.com/slides/csrf/
 
 
 
Ranked #8 on the OWASP Top 10, “Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.” (OWASP Wiki)
 
 
 
CSRF vulnerabilities are commonplace and easily missed by developers who are unfamiliar with this class of attack. Unlike injection vulnerabilities, they do not become apparent during testing unless you know exactly what to look for. This session will provide an introduction to CSRF vulnerabilities, and will include an attack demonstration and practical examples that prevent this type of vulnerability.
 
 
 
John is a web application developer with 10+ years of experience, with a focus on product management, user-experience, and application security. He has recently joined RIT ITS as a Senior Web Programmer / Analyst. He also serves as an officer of the Rochester chapters of OWASP and ISSA, and helps plan the annual Rochester Security Summit.
 
;NodeJS Security
 
Date:  Nov 6th 12 noon - 1:30pm
 
Location: Univ of Rochester College Town – Building 3
 
;Speaker: Jason Ross
 
 
 
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it
 
is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm
 
understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.
 
 
 
Jason Ross is a Senior Consultant specializing in web application
 
testing, Android application and device testing, and incident response
 
management. He has provided network and application vulnerability
 
assessment & penetration testing to a wide range of clients, including
 
US Government agencies and Fortune 100 companies.  He has also
 
developed and delivered training tools and programs to major clients
 
on topics such as advanced mobile penetration testing and forensic
 
techniques.
 
 
 
Jason has a background in network incident response, forensic analysis
 
and Unix & Windows platform engineering. He is an independent security
 
researcher, and has spoken at numerous security conferences, including
 
BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional
 
conferences. Jason is also an active participant in the anti-malware
 
community, and works with several highly vetted trust groups to track,
 
monitor, and mitigate malicious Internet activity.
 
;Introduction to OWASP Application Security – Building and Breaking Applications
 
Date:  Sept 18th 12 noon - 1:30pm
 
;Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN
 
 
 
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.
 
 
 
* OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013
 
* OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles
 
 
 
Presentation Slides: https://www.owasp.org/images/e/ec/Durkee_OWASP_2015_09_AppSec.pdf
 
 
 
;Application Security for Agile and Continuous Delivery
 
Date: May 12th, 2015 6pm
 
;Speaker: Douglass Wilson, IBM Distinguished Engineer
 
* CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU
 
* Free food and drink, provide by our meeting Sponsor, IBM
 
;Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450
 
 
 
;Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities
 
Date: Apr 15, 2015 5:30pm
 
;Speaker: Ralph Durkee
 
* We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities.
 
* In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow.
 
* We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.
 
 
 
;Rochester Security Summit 2014
 
Date: Oct 7-8, 2014 8am - 4:30pm
 
Topics:
 
* Top Ten Web Defenses (Jim Manico)
 
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)
 
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)
 
* Building a Software Security Program (Kuai Hinojosa)
 
Location: Hyatt Regency, Rochester, NY 14604
 
 
 
;June 20 2014 Meeting
 
Topic: Security Development Lifecycle
 
Speaker: Larry Kovnat (CISSP, CISM)
 
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
 
Speaker: Larry Kovnat (CISSP, CISM)
 
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
 
 
 
;April Meeting 2013
 
Topic: Ethical Hacking as a Professional Penetration Testing Technique <br />
 
Speaker: Ralph Durkee, Durkee Consulting <br />
 
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf
 
 
 
;
 
;May 2012
 
Mercury Networks Security Summit
 
Tpoic: Mozilla's Content Security Policy
 
Speaker: Lou Leone <br />
 
https://www.owasp.org/images/9/95/2012_CSP.pptx
 
 
 
;
 
;May 2011 Meeting
 
Michael Coates webinar on Attack-Aware Applications.<br />
 
https://owasp.webex.com/owasp/ldr.php?AT=pb&SP=MC&rID=87764002&rKey=14191b8f8c73dabc
 
 
 
;
 
;May 5, 2011
 
MercuryFest
 
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer
 
Topic: SSL Man-in-the-Middle and Spoofing Attacks
 
 
 
;
 
;March 2011 Meeting
 
Topic: Pastebin Scrapping<br />
 
Speaker: Silas Cutler, Global Crossing, Security Architect
 
 
 
;
 
;January 2011 Meeting
 
Topic: State of OWASP and the State of Web Application Security<br />
 
Speaker: Ralph Durkee, Durkee Consulting
 
 
 
;
 
;August Meeting 2010
 
Topic: Man in the Middle Attacks: SSL Spoofing<br />
 
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting
 
 
 
;
 
;June Meeting 2010
 
Topic: Client Side Exploits 101<br />
 
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS
 
 
 
;
 
;May Meeting 2010
 
Topic: New Techniques in Application Intrusion Detection<br />
 
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.
 
 
 
;
 
;February Meeting 2010
 
Ralph Durkee presented a recap of the recent AppSec conference in DC.<br />
 
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security.
 
 
 
; Oct 29-30 2008 - Rochester Security Summit 2008
 
 
 
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.
 
 
 
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.
 
  
 
== Past Presentations ==
 
== Past Presentations ==
<b>Mercury Networks Security Symposium May 2012</b> I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]
+
{| class="wikitable"
 
+
!Date
<b>January Meeting 2011</b> State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph Durkee State of Web App Security v8.pdf|PDF]]
+
!Title
 
+
!Presenter
<b>August Meeting 2010</b> Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL Spoofing.pdf|PDF]]<br />
+
!Download
<b>August Meeting 2010</b> Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph Durkee SSL MITM v1.pdf|PDF]]
+
|-
 
+
|2019, May
<b>May Meeting 2010</b> New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]<br />
+
|OWASP Amass Project
<b>May Meeting 2010</b> Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]
+
|Jeff Foley, Anthony Rhodes
 
+
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=https://www.owasp.org/images/0/00/OWASP_Amass_Rochester_2019.pdf]]
<b>February Meeting 2010</b> DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]
+
|-
 
+
|2019, April
<b>October Hackerfest 2009</b> Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro to OWASP Rochester v9.ppt|PPT]]
+
|Ethical Web Hacking
 
+
|Jim Keeler
<b>September OWASP 2009</b> Securing Apache Web Servers with Mod Security & CIS Benchmark by Ralph Durkee [[Media:Durkee Apache 2009 v7.ppt|PPT]] [[Media:Durkee Apache 2009 v7.odp|Open Office]]
+
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://docs.google.com/presentation/d/1kGcynzAoTaYajjkaSPo1dRUD1QQ13NuMFTZRDm9QAN0/edit?usp=sharing]]
 +
|-
 +
|2018, December
 +
|Introduction to Threat Modeling
 +
|Jim Keeler
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://docs.google.com/presentation/d/1J50yIrf-pHb7pTIjqBzRhLTk3TAPtm_F30J7RnVfOvE/edit?usp=sharing]]
 +
|-
 +
|2012, May
 +
''Mercury Networks Security Symposium''
 +
|I'll see your cross site scripting and raise you a Content Security Policy
 +
|Lou Leone
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://www.owasp.org/images/9/95/2012_CSP.pptx]]
 +
|-
 +
|2011, January
 +
|State of OWASP and the State of Web Application Security by Ralph Durkee
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:Ralph Durkee State of Web App Security v8.pdf‎]]
 +
|-
 +
|2010, August
 +
|Man in the Middle Attacks: SSL Spoofing
 +
|Duane Peifer
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:SSL_Spoofing.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:SSL Spoofing.pdf‎]]
 +
|-
 +
|2010, August
 +
|Man in the Middle Attacks: SSL Spoofing
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Ralph_Durkee_SSL_MITM_v1.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:Ralph Durkee SSL MITM v1.pdf]]
 +
|-
 +
|2010, May
 +
|New Techniques in Application Intrusion Detection
 +
|Al Huizenga
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP may17-10.pptx‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:OWASP may17-10.pdf‎]]
 +
|-
 +
|2010, May
 +
|Identity Federation and Claim-based Security
 +
|Andrea Cogliati
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:SAML and Claims-Based Security.pdf‎]]
 +
|-
 +
|2010, February
 +
|DC AppSec Conference Recap
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP Rochester 2010 Feb.ppt]]
 +
|-
 +
|2009, October
 +
''October Hackerfest''
 +
|Introduction to OWASP Rochester
 +
|Ralph Durkee,
 +
Lou Leone
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Intro to OWASP Rochester v9.ppt]]
 +
|-
 +
|2009, September
 +
|Securing Apache Web Servers with Mod Security & CIS Benchmark
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Media:Durkee Apache 2009 v7.ppt]], [[Media:Durkee Apache 2009 v7.odp|ODP]]
 +
|-
 +
|2009, May
 +
|Key Management - One Perspective
 +
|Lou Leone
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:N-tierKeyManagementIssues.ppt]]
 +
|-
 +
|2009, May
 +
''IEEE''
 +
|Introduction to OWASP
 +
|Ralph Durkee,
 +
Andrea Cogliati
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Intro to OWASP Rochester v5.ppt]]
 +
|-
 +
|2009, January
 +
|Paranoid Programming Practices
 +
|Lou Leone,
 +
Aaron Witt
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:ParanoidProgrammers.ppt]]
 +
|-
 +
|2008, May
 +
|Database Encryption
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Database_Encryption.ppt]]
 +
|-
 +
|2008, January
 +
|SQL Injection and Dynamic SQL
 +
|Andrea Cogliati
 +
|[[Media:MoreSQL.zip|ZIP]]
 +
|-
 +
|2007, September
 +
|2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP Top 10 2007 v6.ppt]]
 +
|-
 +
|2006, October
 +
|The first of the OWASP top ten: unvalidated input
 +
|Steve Buck
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt]]
 +
|-
 +
|2006, April
 +
|PGP: Encryption for e-mail and web applications
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf]]
 +
|-
 +
|2006, February
 +
|Identity Theft, Phishing and Pharming
 +
|Danny Allan
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf]]
 +
|-
 +
|2006, February
 +
|Secure e-mail
 +
|Thomas Bullinger
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/SecureEmail.pdf]]
 +
|-
 +
|2006, January
 +
|PCI Compliance
 +
|Pat Massey,
 +
Ralph Durkee,
  
<b>May OWASP 2009</b> Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]
+
Maureen Baran
 
+
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf]]
<b>May IEEE 2009</b> Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro to OWASP Rochester v5.ppt|PPT]]
+
|-
 
+
|2005, September
<b>January 2009</b> Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]
+
|Two Factor Authentication for Java Applications with Client Certificates
 
+
|Ralph Durkee
<b>May 2008</b> Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]
+
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf]], [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi SXI]
 
+
|-
<b>January 2008</b> SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]
+
|2005, April
 
+
|Avoiding Backend Exploitation of Mail Forms
<b>September 2007</b> 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP Top 10 2007 v6.ppt|PowerPoint]]
+
|Max Kessler
 
+
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/owasp-mailform-exploitation.ppt]], [http://rd1.net/owasp/owasp-mailform-exploitation.sxi SXI]
<b>October 2006</b> The first of the OWASP top ten: unvalidated input, by Steve Buck.
+
|-
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]
+
|2005, March
 
+
|Bringing Two-Factor Authentication to Web Applications
<b>April 2006</b> PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]
+
|Michael Starks
 
+
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt]], [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt SXI]
<b>February 2006</b> Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]
+
|-
 
+
|2005, February
<b>February 2006</b> Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]
+
|Insecure Storage
 
+
|Chris Karr
<b>January 2006</b> PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]
+
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Insecure_Storage.ppt]]
 
+
|-
<b>September 2005</b> Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]
+
|2005, January
 
+
|Access Control and Session Mgmnt
<b>April 2005</b> Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]
+
|Steve Buck
 
+
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Jan_OWASP-access-control.ppt]], [http://rd1.net/owasp/Jan_OWASP-access-control.sxi SXI]
<b>March 2005</b> Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]
+
|-
 
+
|2004, November
<b>February 2005</b> Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]
+
|Intro to OWASP
 
+
|Ralph Durkee
<b>January 2005</b> Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]
+
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Nov_OWASP_20041103.ppt]]
 
+
|-
<b>November 2004</b> Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]
+
|2004, November
 +
|Demonstration of SQL Injection attack and prevention
 +
|Paul Cupo
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Nov_OWASP_20041103.ppt]]
 +
|}
  
 
[[Category:OWASP Chapter]]
 
[[Category:OWASP Chapter]]
 
[[Category:United States]]
 
[[Category:United States]]
 +
 +
__NOTOC__

Latest revision as of 14:01, 9 October 2019

Rochester banner.jpg

Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leaders are:

If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.

Connect With Us

Follow-us-on-twitter.png Meetup-button.png Slack.png
#chapter-rochester

Join our announcements mailing list

Join our discussion mailing list

Chapter Meetings

Visit our group on meetup.com

Archived events

Visit our archive page for all old event details.

Last Year's Events

OWASP December 19th Meeting

You are invited to join the Rochester OWASP chapter and the ISSA Rochester chapter for our joint December 19th Meeting at 6pm. Space is limited, so please RSVP by Dec 12th so we can plan accordingly. Dinosaur BBQ will be provided! Come and hear a great presentation, and network with your fellow professionals.

The OWASP chapter is covering its portion of the costs for the event, so if you are a paid OWASP member, Thank you! If not, please consider signing up today.

Our own illustrious Jim Keeler will presenting:

Title: Introduction to Threat Modeling

Abstract: Every business has something to protect. Has yours modeled all of the ways it could be attacked? How will you defend your assets if attacked? How will you account for changes in the threat landscape? We will explore all of these questions and discuss a repeatable process for reducing risk.

Bio: Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.

Where: Nixon Peabody, 1300 Clinton Square, 14th floor [CORRECTED] (free parking underneath the building, bring the ticket to the meeting for validation)

When: Wednesday, Dec 19th, 6:00 PM

Please RSVP by Dec 12th to Ralph Durkee

Thank you, Hope to see you there!


Rochester Security Summit 2018

Date: Oct 9 & 10, 2018 OWASP AppSec Track:

  • What is the Android Colluded Applications Attack and How to Detect It (Igor Khokhlov & Leon Reznik)
  • Pentesting DevOps: Attacking Containers and Container Orchestration (Mark Manning)
  • Rocking The (Vox)Vote (Jason Ross)
  • Your Apps Have Gone Serverless. Has Your Security? (Tal Melamed)
  • Techniques Criminals Use to Break Authentication and How to Defend Against These Attacks (Danny Harris)
  • The Industrialization of Red and Blue Teaming (Ashley Zaya)


OWASP Juice Shop Workshop
July 18th, 2018
5:30 pm - 8:00 pm
44 Celebration Drive, Conference Rooms 2007a and 2007b

We're looking for chapter members who are familiar with basic application security and the OWASP Top 10 who are interested in learning OWASP Juice Shop. The goal is to help plan and facilitate a larger capture-the-flag event at a future meeting. Please bring a Laptop with a WiFi network connection and a modern web browser. You will be installing OWASP Juice Shop on your laptop.

What is OWASP Juice Shop?

OWASP Juice Shop is an intentionally insecure web app for security trainings written entirely in JavaScript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. https://www.owasp.org/index.php/OWASP_Juice_Shop_Project

What will the workshop cover?

Jim Keeler will lead the workshop. Attendees will learn about the OWASP Juice Shop project, installation and setup, how to exploit common web application vulnerabilities, jeopardy style capture-the-flag (CTF) events, and CTF scoreboards. At the end of the workshop we will be looking for volunteers to help us host a future CTF event! Pizza will be provided. Please RSVP to Ralph Durkee, <[email protected]> so that we may expect you.

Directions
UofRMC Map.png

Park anywhere in the green area. You can enter from Elmwood Ave going eastbound only or from Celebration Drive. Parking is free in the labeled surface lot. Enter the building by the arrow. Take the stairs or elevator to the 2nd floor. Take a right off the elevator and you should be able to easily find room 2007.


OWASP Rochester Social Event

Please join the Rochester OWASP chapter for a social event Wednesday, April 25th at MacGregors' in Henrietta.

Appetizers will be provided.

When: Wednesday, April 25 at 5:30pm

Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)

OWASP Rochester Social Event

Please join the Rochester OWASP chapter for a social event Wednesday, December 6th at MacGregors' in Henrietta.

Appetizers will be provided.

When: Wednesday, December 6 at 5:30pm

Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others.

Mailing Lists:

Prior to participating with OWASP please review the Chapter Rules.

Past Presentations

Date Title Presenter Download
2019, May OWASP Amass Project Jeff Foley, Anthony Rhodes 16x16-icon-w-pdf.png
2019, April Ethical Web Hacking Jim Keeler 16x16-icon-w-ppt.png
2018, December Introduction to Threat Modeling Jim Keeler 16x16-icon-w-ppt.png
2012, May

Mercury Networks Security Symposium

I'll see your cross site scripting and raise you a Content Security Policy Lou Leone 16x16-icon-w-ppt.png
2011, January State of OWASP and the State of Web Application Security by Ralph Durkee Ralph Durkee 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, August Man in the Middle Attacks: SSL Spoofing Duane Peifer 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, August Man in the Middle Attacks: SSL Spoofing Ralph Durkee 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, May New Techniques in Application Intrusion Detection Al Huizenga 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, May Identity Federation and Claim-based Security Andrea Cogliati 16x16-icon-w-pdf.png
2010, February DC AppSec Conference Recap Ralph Durkee 16x16-icon-w-ppt.png
2009, October

October Hackerfest

Introduction to OWASP Rochester Ralph Durkee,

Lou Leone

16x16-icon-w-ppt.png
2009, September Securing Apache Web Servers with Mod Security & CIS Benchmark Ralph Durkee 16x16-icon-w-ppt.png, ODP
2009, May Key Management - One Perspective Lou Leone 16x16-icon-w-ppt.png
2009, May

IEEE

Introduction to OWASP Ralph Durkee,

Andrea Cogliati

16x16-icon-w-ppt.png
2009, January Paranoid Programming Practices Lou Leone,

Aaron Witt

16x16-icon-w-ppt.png
2008, May Database Encryption Ralph Durkee 16x16-icon-w-ppt.png
2008, January SQL Injection and Dynamic SQL Andrea Cogliati ZIP
2007, September 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities Ralph Durkee 16x16-icon-w-ppt.png
2006, October The first of the OWASP top ten: unvalidated input Steve Buck 16x16-icon-w-ppt.png
2006, April PGP: Encryption for e-mail and web applications Ralph Durkee 16x16-icon-w-pdf.png
2006, February Identity Theft, Phishing and Pharming Danny Allan 16x16-icon-w-pdf.png
2006, February Secure e-mail Thomas Bullinger 16x16-icon-w-pdf.png
2006, January PCI Compliance Pat Massey,

Ralph Durkee,

Maureen Baran

16x16-icon-w-pdf.png
2005, September Two Factor Authentication for Java Applications with Client Certificates Ralph Durkee 16x16-icon-w-pdf.png, SXI
2005, April Avoiding Backend Exploitation of Mail Forms Max Kessler 16x16-icon-w-ppt.png, SXI
2005, March Bringing Two-Factor Authentication to Web Applications Michael Starks 16x16-icon-w-ppt.png, SXI
2005, February Insecure Storage Chris Karr 16x16-icon-w-ppt.png
2005, January Access Control and Session Mgmnt Steve Buck 16x16-icon-w-ppt.png, SXI
2004, November Intro to OWASP Ralph Durkee 16x16-icon-w-ppt.png
2004, November Demonstration of SQL Injection attack and prevention Paul Cupo 16x16-icon-w-ppt.png