This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
(Added Lou's presentation at Mercury Networks Security Symposium)
m (Updated Slack link.)
 
(125 intermediate revisions by 7 users not shown)
Line 1: Line 1:
<hr>
+
[[File:Rochester_banner.jpg|800px]]
  
 
== Welcome to the OWASP Rochester Local Chapter ==
 
== Welcome to the OWASP Rochester Local Chapter ==
  
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]
+
Welcome to the local Rochester chapter homepage. The chapter leaders are:
 +
* [mailto:[email protected] Ralph Durkee]
 +
* [mailto:[email protected] John King]
 +
* [mailto:jim.keeler@owasp.org James Keeler]
  
<paypal>Rochester</paypal>
+
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.
  
== Participation ==
+
== Connect With Us ==
  
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].
+
{| cellspacing="15"
 +
|-
 +
| [[Image:Follow-us-on-twitter.png|175px|link=https://twitter.com/owasprochester]]
 +
| [[Image:meetup-button.png|108px|link=https://www.meetup.com/OWASP-Rochester-Chapter]]
 +
| [[Image:Slack.png|175px|link=https://join.slack.com/t/owasp/shared_invite/enQtNjExMTc3MTg0MzU4LWQ2Nzg3NGJiZGQ2MjRmNzkzN2Q4YzU1MWYyZTdjYjA2ZTA5M2RkNzE2ZjdkNzI5ZThhOWY5MjljYWZmYmY4ZjM]]
 +
|-
 +
|
 +
|
 +
| #chapter-rochester
 +
|}
  
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.
+
[https://groups.google.com/a/owasp.org/forum/#!forum/rochester-chapter-announce/join Join our announcements mailing list]
  
== Local Officers ==
+
[https://groups.google.com/a/owasp.org/forum/#!forum/rochester-chapter/join Join our discussion mailing list]
  
<ul>
+
<meetup group="OWASP-Rochester-Chapter" />
*<b>President:</b> [mailto:[email protected] Andrea Cogliati]
+
=== Archived events ===
*<b>Vice President:</b> [mailto:[email protected] Ralph Durkee]
+
[[Rochester_Meeting_Archive|Visit our archive page for all old event details.]]
*<b>Treasurer:</b> [mailto:[email protected] Andrea Cogliati]
 
*<b>Secretary:</b> Appointed by Event Coordinator at each meeting.
 
*<b>Event Coordinator:</b> [mailto:andrea.[email protected] Andrea Cogliati]
 
*<b>Communications and Chapter OWASP Evangelist:</b> [mailto:[email protected] Lou Leone]
 
*<b>Webmaster:</b> [mailto:[email protected] Duane Peifer]
 
*<b>Mail List Administrator:</b> [mailto:[email protected] Duane Peifer]
 
</ul>
 
  
== Meeting Dates & Location ==
+
=== Last Year's Events ===
 +
'''OWASP December 19th Meeting'''
  
<b>Dates:</b> The third Monday of every month, starting at 6:00 PM.
+
You are invited to join the Rochester OWASP chapter and the ISSA Rochester chapter for our joint December 19<sup>th</sup> Meeting at 6pm. Space is limited, so please RSVP by Dec 12<sup>th</sup> so we can plan accordingly. Dinosaur BBQ will be provided! Come and hear a great presentation, and network with your fellow professionals.
  
<b>Types of events:</b> Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months
+
The OWASP chapter is covering its portion of the costs for the event, so if you are a paid OWASP member, Thank you! If not, please consider signing up today.
  
<b>Locations:</b>
+
Our own illustrious '''Jim Keeler''' will presenting:
  
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.
+
'''Title''': Introduction to Threat Modeling
* Beer and wings at Mac Gregor's Grill & Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&hl=en&geocode=&time=&date=&ttype=&q=300+Jefferson+Rd+Rochester+NY&sll=43.15549,-77.61601&sspn=0.284013,0.55481&ie=UTF8&om=1&z=16&iwloc=addr Google Maps]
 
<br/>
 
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.
 
  
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.
+
'''Abstract''': Every business has something to protect. Has yours modeled all of the ways it could be attacked? How will you defend your assets if attacked? How will you account for changes in the threat landscape? We will explore all of these questions and discuss a repeatable process for reducing risk.
  
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.
+
'''Bio''': Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.
  
  '''OWASP at Mercury Network Security Symposium'''
+
'''Where''': Nixon Peabody, 1300 Clinton Square, 14th floor [CORRECTED] (free parking underneath the building, bring the ticket to the meeting for validation)
  
OWASP will be at the [http://mercurynetworkssecurity.com Mercury Networks Security Symposium] again this year. Come visit us at the <b>[http://maps.google.com/maps?q=Doubletree+Hotel+Rochester,+1111+Jefferson+Road,+Rochester,+NY&hl=en&sll=43.086364,-77.607272&sspn=0.014449,0.018089&oq=Doubletree+hotel+1111+jef&hq=Doubletree+Hotel&hnear=1111+Jefferson+Rd,+Rochester,+New+York+14623&t=m&z=17 Doubletree Hotel, Rochester, NY] on May 3rd, from 7:45am to 12:30pm</b>.
+
'''When''': Wednesday, Dec 19th, 6:00 PM
  
Our chapter evangelist, Lou Leone, will also give a technical presentation at 8:30: "I'll see your cross site scripting and raise you a Content Security Policy"
+
Please RSVP by Dec 12<sup>th</sup> to Ralph Durkee
  
The event is free for IT Professional. Please register for the event at [http://mercurynetworkssecurity.com/Register.html http://mercurynetworkssecurity.com/Register.html]
+
Thank you, Hope to see you there!
  
See you there!
 
  
  '''March Meeting'''
+
;;Rochester Security Summit 2018
 +
Date: Oct 9 & 10, 2018  OWASP AppSec Track:
 +
* What is the Android Colluded Applications Attack and How to Detect It (Igor Khokhlov & Leon Reznik)
 +
* Pentesting DevOps: Attacking Containers and Container Orchestration (Mark Manning)
 +
* Rocking The (Vox)Vote (Jason Ross)
 +
* Your Apps Have Gone Serverless. Has Your Security? (Tal Melamed)
 +
* Techniques Criminals Use to Break Authentication and How to Defend Against These Attacks (Danny Harris)
 +
* The Industrialization of Red and Blue Teaming (Ashley Zaya)
  
<b>What:</b> Joint ISSA and OWASP meeting - De-Anonymizing Anonymous
 
  
<b>When:</b> Thursday, March 29th at 5:30pm
+
; '''OWASP Juice Shop Workshop'''
 +
; '''July 18th, 2018'''
 +
; '''5:30 pm - 8:00 pm'''
 +
; '''44 Celebration Drive, Conference Rooms 2007a and 2007b'''
  
<b>Location:</b> Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604
+
We're looking for chapter members who are familiar with basic application security and the OWASP Top 10 who are interested in learning OWASP Juice Shop.  The goal is to help plan and facilitate a larger capture-the-flag event at a future meeting.  Please bring a Laptop with a WiFi network connection and a modern web browser.  You will be installing OWASP Juice Shop on your laptop.
  
<b>Abstract:</b> What do you see when you take the Guy Fawkes mask off? In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.
+
; '''What is OWASP Juice Shop?'''
 
This talk will give a walk-through the key stages of an Anonymous campaign:
 
  
*      Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.
+
OWASP Juice Shop is an intentionally insecure web app for security trainings written entirely in JavaScript which encompasses the entire OWASP Top Ten and other severe security flawsJuice Shop is written in Node.js, Express and AngularJS. https://www.owasp.org/index.php/OWASP_Juice_Shop_Project
*      Application attack: We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.
 
*      DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.
 
  
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.
+
; '''What will the workshop cover?'''
  
<b>Speaker:</b> Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek. Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.
+
Jim Keeler will lead the workshop. Attendees will learn about the OWASP Juice Shop project, installation and setup, how to exploit common web application vulnerabilities, jeopardy style capture-the-flag (CTF) events, and CTF scoreboards. At the end of the workshop we will be looking for volunteers to help us host a future CTF event!  Pizza will be provided.  '''Please RSVP to Ralph Durkee, <Ralph.Durkee@owasp.org> so that we may expect you.'''
  
<b>Please RSVP to [mailto:[email protected] [email protected]] by Friday, March 23 so we can get a headcount.</b>
+
; '''Directions'''
  
<b>Directions:</b>
+
[[File:UofRMC Map.png|thumb]]
 +
Park anywhere in the green area. You can enter from Elmwood Ave going eastbound only or from Celebration Drive. Parking is free in the labeled surface lot. Enter the building by the arrow. Take the stairs or elevator to the 2nd floor. Take a right off the elevator and you should be able to easily find room 2007.
  
From the East:
 
  
* Take I-490 west towards Rochester
 
* Take the Clinton Avenue exit
 
* Clinton Square Building is about two blocks down on left
 
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left
 
* Entrance to parking garage is on left just after Broad Street
 
* Take garage elevator to lobby; then take lobby elevators to 14th floor
 
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room
 
  
From the West:
+
; '''OWASP Rochester Social Event'''
 +
Please join the Rochester OWASP chapter for a social event Wednesday, April 25th at MacGregors' in Henrietta.
  
* Take I-490 East towards Rochester
+
Appetizers will be provided.
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15
 
* Turn left at 2nd light
 
* Turn left at light onto Clinton
 
* Stay in second lane from the left
 
* Clinton Square Building (corner of Clinton & Broad) is about two blocks down on left
 
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage
 
* Take garage elevator to lobby; then take lobby elevators to 14th floor
 
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room
 
  
== Past Events ==
+
'''When: Wednesday, April 25 at 5:30pm'''
;May 2011 Meeting
 
Michael Coates webinar on Attack-Aware Applications.<br/>
 
https://owasp.webex.com/owasp/ldr.php?AT=pb&SP=MC&rID=87764002&rKey=14191b8f8c73dabc
 
  
;May 5, 2011
+
'''Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)'''
MercuryFest
 
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer
 
Topic: SSL Man-in-the-Middle and Spoofing Attacks
 
  
;March 2011 Meeting
+
; '''OWASP Rochester Social Event'''
Topic: Pastebin Scrapping<br/>
+
Please join the Rochester OWASP chapter for a social event Wednesday, December 6th at MacGregors' in Henrietta.
Speaker: Silas Cutler, Global Crossing, Security Architect
 
  
;January 2011 Meeting
+
Appetizers will be provided.
Topic: State of OWASP and the State of Web Application Security<br/>
 
Speaker: Ralph Durkee, Durkee Consulting
 
  
;August Meeting 2010
+
When: Wednesday, December 6 at 5:30pm
Topic: Man in the Middle Attacks: SSL Spoofing<br/>
 
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting
 
  
;June Meeting 2010
+
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)
Topic: Client Side Exploits 101<br/>
 
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS
 
  
;May Meeting 2010
+
== Participation ==
Topic: New Techniques in Application Intrusion Detection<br/>
 
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.
 
 
 
;February Meeting 2010
 
Ralph Durkee presented a recap of the recent AppSec conference in DC.<br/>
 
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security.
 
  
 +
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others.
  
; Oct 29-30 2008 - Rochester Security Summit 2008
+
'''Mailing Lists:'''
 
+
* [https://lists.owasp.org/mailman/listinfo/owasp-rochester-announce Announcements]
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month. This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.
+
* [http://lists.owasp.org/pipermail/owasp-rochester-ny Discussion]
 
+
Prior to participating with OWASP please review the [[:Category:Chapter Handbook|Chapter Rules]].
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.
 
  
 
== Past Presentations ==
 
== Past Presentations ==
<b>Mercury Networks Security Symposium May 2012</b> I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]
+
{| class="wikitable"
 +
!Date
 +
!Title
 +
!Presenter
 +
!Download
 +
|-
 +
|2019, May
 +
|OWASP Amass Project
 +
|Jeff Foley, Anthony Rhodes
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=https://www.owasp.org/images/0/00/OWASP_Amass_Rochester_2019.pdf]]
 +
|-
 +
|2019, April
 +
|Ethical Web Hacking
 +
|Jim Keeler
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://docs.google.com/presentation/d/1kGcynzAoTaYajjkaSPo1dRUD1QQ13NuMFTZRDm9QAN0/edit?usp=sharing]]
 +
|-
 +
|2018, December
 +
|Introduction to Threat Modeling
 +
|Jim Keeler
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://docs.google.com/presentation/d/1J50yIrf-pHb7pTIjqBzRhLTk3TAPtm_F30J7RnVfOvE/edit?usp=sharing]]
 +
|-
 +
|2012, May
 +
''Mercury Networks Security Symposium''
 +
|I'll see your cross site scripting and raise you a Content Security Policy
 +
|Lou Leone
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=https://www.owasp.org/images/9/95/2012_CSP.pptx]]
 +
|-
 +
|2011, January
 +
|State of OWASP and the State of Web Application Security by Ralph Durkee
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:Ralph Durkee State of Web App Security v8.pdf‎]]
 +
|-
 +
|2010, August
 +
|Man in the Middle Attacks: SSL Spoofing
 +
|Duane Peifer
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:SSL_Spoofing.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:SSL Spoofing.pdf‎]]
 +
|-
 +
|2010, August
 +
|Man in the Middle Attacks: SSL Spoofing
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Ralph_Durkee_SSL_MITM_v1.ppt‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:Ralph Durkee SSL MITM v1.pdf]]
 +
|-
 +
|2010, May
 +
|New Techniques in Application Intrusion Detection
 +
|Al Huizenga
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP may17-10.pptx‎]] [[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:OWASP may17-10.pdf‎]]
 +
|-
 +
|2010, May
 +
|Identity Federation and Claim-based Security
 +
|Andrea Cogliati
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=Media:SAML and Claims-Based Security.pdf‎]]
 +
|-
 +
|2010, February
 +
|DC AppSec Conference Recap
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP Rochester 2010 Feb.ppt]]
 +
|-
 +
|2009, October
 +
''October Hackerfest''
 +
|Introduction to OWASP Rochester
 +
|Ralph Durkee,
 +
Lou Leone
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Intro to OWASP Rochester v9.ppt]]
 +
|-
 +
|2009, September
 +
|Securing Apache Web Servers with Mod Security & CIS Benchmark
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Media:Durkee Apache 2009 v7.ppt]], [[Media:Durkee Apache 2009 v7.odp|ODP]]
 +
|-
 +
|2009, May
 +
|Key Management - One Perspective
 +
|Lou Leone
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:N-tierKeyManagementIssues.ppt]]
 +
|-
 +
|2009, May
 +
''IEEE''
 +
|Introduction to OWASP
 +
|Ralph Durkee,
 +
Andrea Cogliati
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Intro to OWASP Rochester v5.ppt]]
 +
|-
 +
|2009, January
 +
|Paranoid Programming Practices
 +
|Lou Leone,
 +
Aaron Witt
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:ParanoidProgrammers.ppt]]
 +
|-
 +
|2008, May
 +
|Database Encryption
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:Database_Encryption.ppt]]
 +
|-
 +
|2008, January
 +
|SQL Injection and Dynamic SQL
 +
|Andrea Cogliati
 +
|[[Media:MoreSQL.zip|ZIP]]
 +
|-
 +
|2007, September
 +
|2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=Media:OWASP Top 10 2007 v6.ppt]]
 +
|-
 +
|2006, October
 +
|The first of the OWASP top ten: unvalidated input
 +
|Steve Buck
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt]]
 +
|-
 +
|2006, April
 +
|PGP: Encryption for e-mail and web applications
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf]]
 +
|-
 +
|2006, February
 +
|Identity Theft, Phishing and Pharming
 +
|Danny Allan
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf]]
 +
|-
 +
|2006, February
 +
|Secure e-mail
 +
|Thomas Bullinger
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/SecureEmail.pdf]]
 +
|-
 +
|2006, January
 +
|PCI Compliance
 +
|Pat Massey,
 +
Ralph Durkee,
  
<b>January Meeting 2011</b> State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]<br/>
+
Maureen Baran
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf]]
 +
|-
 +
|2005, September
 +
|Two Factor Authentication for Java Applications with Client Certificates
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-pdf.png|frameless|16x16px|link=http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf]], [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi SXI]
 +
|-
 +
|2005, April
 +
|Avoiding Backend Exploitation of Mail Forms
 +
|Max Kessler
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/owasp-mailform-exploitation.ppt]], [http://rd1.net/owasp/owasp-mailform-exploitation.sxi SXI]
 +
|-
 +
|2005, March
 +
|Bringing Two-Factor Authentication to Web Applications
 +
|Michael Starks
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt]], [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt SXI]
 +
|-
 +
|2005, February
 +
|Insecure Storage
 +
|Chris Karr
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Insecure_Storage.ppt]]
 +
|-
 +
|2005, January
 +
|Access Control and Session Mgmnt
 +
|Steve Buck
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Jan_OWASP-access-control.ppt]], [http://rd1.net/owasp/Jan_OWASP-access-control.sxi SXI]
 +
|-
 +
|2004, November
 +
|Intro to OWASP
 +
|Ralph Durkee
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Nov_OWASP_20041103.ppt]]
 +
|-
 +
|2004, November
 +
|Demonstration of SQL Injection attack and prevention
 +
|Paul Cupo
 +
|[[File:16x16-icon-w-ppt.png|frameless|16x16px|link=http://rd1.net/owasp/Nov_OWASP_20041103.ppt]]
 +
|}
  
<b>August Meeting 2010</b> Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]<br/>
+
[[Category:OWASP Chapter]]
<b>August Meeting 2010</b> Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]<br/>
+
[[Category:United States]]
 
 
<b>May Meeting 2010</b> New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]<br/>
 
<b>May Meeting 2010</b> Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]
 
 
 
<b>February Meeting 2010</b> DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]
 
 
 
<b>October Hackerfest 2009</b> Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]
 
 
 
<b>September OWASP 2009</b> Securing Apache Web Servers with Mod Security & CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]
 
 
 
<b>May OWASP 2009</b> Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]
 
 
 
<b>May IEEE 2009</b> Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]
 
 
 
<b>January 2009</b> Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]
 
 
 
<b>May 2008</b> Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]
 
 
 
<b>January 2008</b> SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]
 
 
 
<b>September 2007</b> 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]
 
 
 
<b>October 2006</b> The first of the OWASP top ten: unvalidated input, by Steve Buck.
 
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]
 
 
 
<b>April 2006</b> PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]
 
 
 
<b>February 2006</b> Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]
 
 
 
<b>February 2006</b> Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]
 
 
 
<b>January 2006</b> PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]
 
 
 
<b>September 2005</b> Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]
 
 
 
<b>April 2005</b> Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]
 
 
 
<b>March 2005</b> Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]
 
  
<b>February 2005</b> Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]
+
__NOTOC__
 
 
<b>January 2005</b> Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]
 
 
 
<b>November 2004</b> Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]
 
 
 
[[Category:OWASP Chapter]]
 
[[Category:New York]]
 

Latest revision as of 14:01, 9 October 2019

Rochester banner.jpg

Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leaders are:

If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.

Connect With Us

Follow-us-on-twitter.png Meetup-button.png Slack.png
#chapter-rochester

Join our announcements mailing list

Join our discussion mailing list

Chapter Meetings

Visit our group on meetup.com

Archived events

Visit our archive page for all old event details.

Last Year's Events

OWASP December 19th Meeting

You are invited to join the Rochester OWASP chapter and the ISSA Rochester chapter for our joint December 19th Meeting at 6pm. Space is limited, so please RSVP by Dec 12th so we can plan accordingly. Dinosaur BBQ will be provided! Come and hear a great presentation, and network with your fellow professionals.

The OWASP chapter is covering its portion of the costs for the event, so if you are a paid OWASP member, Thank you! If not, please consider signing up today.

Our own illustrious Jim Keeler will presenting:

Title: Introduction to Threat Modeling

Abstract: Every business has something to protect. Has yours modeled all of the ways it could be attacked? How will you defend your assets if attacked? How will you account for changes in the threat landscape? We will explore all of these questions and discuss a repeatable process for reducing risk.

Bio: Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.

Where: Nixon Peabody, 1300 Clinton Square, 14th floor [CORRECTED] (free parking underneath the building, bring the ticket to the meeting for validation)

When: Wednesday, Dec 19th, 6:00 PM

Please RSVP by Dec 12th to Ralph Durkee

Thank you, Hope to see you there!


Rochester Security Summit 2018

Date: Oct 9 & 10, 2018 OWASP AppSec Track:

  • What is the Android Colluded Applications Attack and How to Detect It (Igor Khokhlov & Leon Reznik)
  • Pentesting DevOps: Attacking Containers and Container Orchestration (Mark Manning)
  • Rocking The (Vox)Vote (Jason Ross)
  • Your Apps Have Gone Serverless. Has Your Security? (Tal Melamed)
  • Techniques Criminals Use to Break Authentication and How to Defend Against These Attacks (Danny Harris)
  • The Industrialization of Red and Blue Teaming (Ashley Zaya)


OWASP Juice Shop Workshop
July 18th, 2018
5:30 pm - 8:00 pm
44 Celebration Drive, Conference Rooms 2007a and 2007b

We're looking for chapter members who are familiar with basic application security and the OWASP Top 10 who are interested in learning OWASP Juice Shop. The goal is to help plan and facilitate a larger capture-the-flag event at a future meeting. Please bring a Laptop with a WiFi network connection and a modern web browser. You will be installing OWASP Juice Shop on your laptop.

What is OWASP Juice Shop?

OWASP Juice Shop is an intentionally insecure web app for security trainings written entirely in JavaScript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. https://www.owasp.org/index.php/OWASP_Juice_Shop_Project

What will the workshop cover?

Jim Keeler will lead the workshop. Attendees will learn about the OWASP Juice Shop project, installation and setup, how to exploit common web application vulnerabilities, jeopardy style capture-the-flag (CTF) events, and CTF scoreboards. At the end of the workshop we will be looking for volunteers to help us host a future CTF event! Pizza will be provided. Please RSVP to Ralph Durkee, <[email protected]> so that we may expect you.

Directions
UofRMC Map.png

Park anywhere in the green area. You can enter from Elmwood Ave going eastbound only or from Celebration Drive. Parking is free in the labeled surface lot. Enter the building by the arrow. Take the stairs or elevator to the 2nd floor. Take a right off the elevator and you should be able to easily find room 2007.


OWASP Rochester Social Event

Please join the Rochester OWASP chapter for a social event Wednesday, April 25th at MacGregors' in Henrietta.

Appetizers will be provided.

When: Wednesday, April 25 at 5:30pm

Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)

OWASP Rochester Social Event

Please join the Rochester OWASP chapter for a social event Wednesday, December 6th at MacGregors' in Henrietta.

Appetizers will be provided.

When: Wednesday, December 6 at 5:30pm

Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others.

Mailing Lists:

Prior to participating with OWASP please review the Chapter Rules.

Past Presentations

Date Title Presenter Download
2019, May OWASP Amass Project Jeff Foley, Anthony Rhodes 16x16-icon-w-pdf.png
2019, April Ethical Web Hacking Jim Keeler 16x16-icon-w-ppt.png
2018, December Introduction to Threat Modeling Jim Keeler 16x16-icon-w-ppt.png
2012, May

Mercury Networks Security Symposium

I'll see your cross site scripting and raise you a Content Security Policy Lou Leone 16x16-icon-w-ppt.png
2011, January State of OWASP and the State of Web Application Security by Ralph Durkee Ralph Durkee 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, August Man in the Middle Attacks: SSL Spoofing Duane Peifer 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, August Man in the Middle Attacks: SSL Spoofing Ralph Durkee 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, May New Techniques in Application Intrusion Detection Al Huizenga 16x16-icon-w-ppt.png 16x16-icon-w-pdf.png
2010, May Identity Federation and Claim-based Security Andrea Cogliati 16x16-icon-w-pdf.png
2010, February DC AppSec Conference Recap Ralph Durkee 16x16-icon-w-ppt.png
2009, October

October Hackerfest

Introduction to OWASP Rochester Ralph Durkee,

Lou Leone

16x16-icon-w-ppt.png
2009, September Securing Apache Web Servers with Mod Security & CIS Benchmark Ralph Durkee 16x16-icon-w-ppt.png, ODP
2009, May Key Management - One Perspective Lou Leone 16x16-icon-w-ppt.png
2009, May

IEEE

Introduction to OWASP Ralph Durkee,

Andrea Cogliati

16x16-icon-w-ppt.png
2009, January Paranoid Programming Practices Lou Leone,

Aaron Witt

16x16-icon-w-ppt.png
2008, May Database Encryption Ralph Durkee 16x16-icon-w-ppt.png
2008, January SQL Injection and Dynamic SQL Andrea Cogliati ZIP
2007, September 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities Ralph Durkee 16x16-icon-w-ppt.png
2006, October The first of the OWASP top ten: unvalidated input Steve Buck 16x16-icon-w-ppt.png
2006, April PGP: Encryption for e-mail and web applications Ralph Durkee 16x16-icon-w-pdf.png
2006, February Identity Theft, Phishing and Pharming Danny Allan 16x16-icon-w-pdf.png
2006, February Secure e-mail Thomas Bullinger 16x16-icon-w-pdf.png
2006, January PCI Compliance Pat Massey,

Ralph Durkee,

Maureen Baran

16x16-icon-w-pdf.png
2005, September Two Factor Authentication for Java Applications with Client Certificates Ralph Durkee 16x16-icon-w-pdf.png, SXI
2005, April Avoiding Backend Exploitation of Mail Forms Max Kessler 16x16-icon-w-ppt.png, SXI
2005, March Bringing Two-Factor Authentication to Web Applications Michael Starks 16x16-icon-w-ppt.png, SXI
2005, February Insecure Storage Chris Karr 16x16-icon-w-ppt.png
2005, January Access Control and Session Mgmnt Steve Buck 16x16-icon-w-ppt.png, SXI
2004, November Intro to OWASP Ralph Durkee 16x16-icon-w-ppt.png
2004, November Demonstration of SQL Injection attack and prevention Paul Cupo 16x16-icon-w-ppt.png