Rochester

Welcome to the OWASP Rochester Local Chapter
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]

Participation
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announce list is for official communications (e.g meeting announcements, web site upates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found here. The discussion mailing list can be found here. You can also review the announce and discussion e-mail archives to see what folks have been talking about. Please make sure you are subscribed to announce to receive any last minute meeting info.

Local Officers
 
 * President: Ralf Durkee
 * Vice President: Chris Karr
 * Secretary and Treasurer: Steve Buck
 * Web and Communications: Michael Starks

Meeting Dates & Location
Dates: The third Monday of every month, starting at 6:00 PM.

Location: 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) Google Map

Meeting space is graciously offered by Bryant & Stratton College Enter the Frontier Commons plaza, near the Post Office. Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant & Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.

February Meeting Details

Date: Monday, February 19, 2007, 6:00 PM

Time: 6:00 PM

Intended audience: Technical

Presenter: Ralph Durkee, CISSP, GSEC, GCIH, GSNA, Principal Security Consultant

Topic: Hands on Web Application Hacking with the OWASP Web Goat

Description: We'll continue our exploration from last month and exploit web applications vulnerabilities using the OWASP Web Goat tool, which is designed for training real-world web application hacking techniques. Group participation will be encouraged. All exploits will be done by a trained professional on an off-the-net vulnerable application that you download from OWASP web site so that you can "try this at home", but always with the appropriate permission first, of course.

Bio: Ralph Durkee: Performing a wide variety of consulting and training projects including software development, systems and networking security throughout his 25+ year career, Ralph is the president and founder of Durkee Consulting, since 1996. His specialty focuses on Internet security consulting and secure systems software development. He helped write a major portion of the Web Application Security training material for the SANS LAMP (Linux Apache MySql PHP) course. Ralph is a recent editor for the Center for Internet Security's Apache, Linux and DNS BIND benchmark. Ralph is a seasoned security consultant and trainer and holds GIAC certifications in GSEC since 2000 then GCIH since 2001 as well as the GSNA and CISSP.

Past Presentations
October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint