Long Island

Long Island

Educational Supporter:

News &amp; Chapter Meeting
UPDATED  Our Next meeting will be held on:

Robert Gezelter - Minimum Necessary Implementation: Reducing Attack Surface increase Security Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS. Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers. We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors. He has spoken widely at conferences throughout the United States and internationally. He has also published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect
 * Date: Saturday, May 14, 2011
 * Time: 12:30pm - 3:30pm
 * Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000
 * Topics & Speakers:

Blake Cornell - Google Gruyere: Practical training for penetration testers Gruyere is Google's version of OWASP WebGoat. It provides a testing environment for people to test their penetration testing skills. Its designed to contain almost every flaw there is. We will go through Gruyere and have a group discussion and find some vulnerabilities.

About the speaker - Blake Cornell has been an IT innovator and developer with over a decade of experience within software and security. He has consulted Fortune 500 companies and various law enforcement agencies with hopes of enacting solutions to ease every day issues. He currently has vested interests within network and application security with as well VoIP technology. He is a proud member and supporter of InfraGard, a partnership between the Federal Bureau of Investigation and the private sector, and OWASP, the premier application security consortium.

He has spoken at or is scheduled to speak at Briarcliffe College (Bethpage, NY), Astricon 2007 (Pheonix, AZ), The Last Hope (New York, NY), ICCS 2009/2010 (New York, NY), HIMSS Virtual Conference, regional OWASP events, FRHack, Fordham University, LIPHP, Rutgers University and Astricon 2010.

He has been mentioned or quoted from organizations such as CNet News, Communications News, Security Focus, Fierce VoIP, NIST NVD, Security Vulns, Cabling Installation & Maintenance Magazine, milw0rm, Packet Storm, BNet, Security Reason, Exotic Liability Podcast

RSVP Requested http://www.owasp.org/images/7/7f/Register.gif
 * Lunch and refreshment will be provided

Directions to Hofstra University (It is just off of Hempstead Turnpike): From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. Map

If you join our mailing list, then you will receive details of the meeting as soon as they are finalized. To be a co-sponsor for this or a future meeting consider annual chapter sponsorship If you can host an upcoming meeting please contact a LI board member.

Calendar
2011 Meeting Schedule The information on this page is subject to change

Saturday, May 14


 * Time: 12:30pm-3:30pm
 * Location: Hofstra University
 * Topics:
 * Robert Gezelter - Minimum Necessary Implementation: Reducing Attack Surface increase Security
 * Blake Cornell - Google Gruyere: Practical training for penetration testers

Sunday, July 17


 * Time: 12:30pm-3:30pm
 * Location: TBD
 * Topics: TBD

Sunday, September 18


 * Time: 12:30pm-3:30pm
 * Location: TBD
 * Topics: TBD

Sunday, November 13


 * Time: 12:30pm-3:30pm
 * Location: TBD
 * Topics: TBD

Past Meetings
March Meeting Date: 3/27/2011 Sunday Time: 12pm-3pm Place: 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753  Rajendra Umadas, OWASP Member

Intro to the OWASP Mobile Project

The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.

Dan Guido, OWASP NY/NJ Board Member

The Exploit Intelligence Project

In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year.

In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats.

Ryan Behan, OWASP LI Board Member Blake Cornell, OWASP Board Member NY/NJ/LI

WebScarab Demo / Web Vulnerabilities Intro WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.

In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.

''Free pizza and beverage will be provided. After event networking will be held at a local bar.''

Chapter Board Members/Contacts

 * [mailto:heleng@owasp.org Helen Gao, CISSP]
 * [mailto:ryan.behan@owasp.org Ryan C Behan]
 * [mailto:blake@owasp.org Blake Cornell] 212-202-6704