Boulder

Please bring a laptop!
The next meeting is

Thursday, July 17th, 2008 at Corporate Express's US Headquarters
at 1 Environmental Way, Broomfield, CO 80021.

Intro to Grendel - a WebApp PenTesting Tool - BRING A LAPTOP
David Byrne and Eric Duprey will be presenting their latest work - Grendel. Grendel is a tool that's been developed to automate some appsec testing.

During this presentation, these guys will show how to use Grendel to accelerate webapp pen testing.

David Byrne is an infosec veteran, with experience ranging from penetration testing for Fortune 100's to architecting security solutions for large multinational financials to consulting for government agencies. David is presently part of the team at Trustwave.

Eric Duprey is a Senior Security Engineer for Dish Network Corporation and co-leader of the Denver OWASP Chapter.

Updates will be spammed to the Chapter Mailing List.

Agenda:

6-6:30 Dinner (at Corporate Express; pizza provided by TrustWave.

6:30 - 6:40 Chapter business

6:40 - 8:00 Presentation and Q&A

Following the meeting we will have informal discussions over beverages at the Gordon Biersch Brewery and Restaurant.

--- April Meeting - Passive Web Application Defect Identification

Ryan Barnett of Breach Security will be speaking about how to employ ModSecurity (an open-source web application firewall) and other Web Application Firewalls (WAFs) to identify web application vulnerabilities.

Identifying web application vulnerabilities has traditionally been achieved by running vulnerability scanners. While these tools can been effective, they have some deficiencies, mainly that they are simply snap-shots in time and they often add network load on the web application. Web application firewalls can help to detect application defects in applications by monitoring the application as it is used. In this presentation, Ryan Barnett, Director of Application Security at Breach, will discuss how deploying a web application firewall can provide more value beyond simply protecting applications from attack. Due to their strategic placement within the application's communication stream, web application firewalls, can provide a great deal of visibility into how an application is used and detect defects by watching the interaction between the application and a client.

Ryan C. Barnett

Ryan C. Barnett is a recognized security thought leader and evangelist who frequently speaks with the media and industry groups.

He is the director of application security at Breach Security. He is also a faculty member for the SANS Institute, where his duties include instructor/courseware developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, "Hacker Techniques, Exploits and Incident Handling" course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC).

Mr. Barnett also serves as the team lead for the Center for Internet Security Apache Benchmark Project and is a member of the Web Application Security Consortium. His web security book, "Preventing Web Attacks with Apache,” was published by Addison/Wesley in 2006.

FROCo8 Slides - FRONT RANGE OWASP CONFERENCE 2008
Here are the links to the available presentations from FROCo8:

Jeremiah Grossman Business Logic Flaws - 7 Deadly Sins
[[Media:FROCo8_JeremiahGrossman_BizLogicFlaws.pdf]]

Akshay Aggarwal Application Security Kung-Fu Competitive Advantage from Threat Modeling
[[Media:ApplicationSecurityKungFuByAkshayAggarwal-FrontRangeOWASP-10Jun08.pdf]]

More info about the event

 Planning page,

PCI DSS 6.6 and 11.3 Clarification Issued
Speaking of web app security...

Clarification WRT PCI requirement 6.6 - WAFs and Code Reviews for PCI compliance.

Clarification WRT PCI requirement 11.3 - pen-testing.

4/14/2008 - Interesting File Download Injection research from Jeff Williams of Aspect Security.

4/1/2008 Yes! There's an April meeting! List-server FUBAR; switching to manual We've been having trouble with our list server. The last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!

2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush). More info info to follow later...

How do I learn more about input validation? Google for Input Validation

Some PHP Security Resources There seem to be dang few PHP security resources. Please edit this wiki if you've got some good ones. In the mean time, here's some stuff that looks pretty good: PHP meets the Top Ten (c2006)

Fortify's "RAT" is a free tool for static code analysis...

SPI Dynamics to Speak at Feb's Chapter Meeting Derek Zunker, my local HP rep, has volunteered to sponsor February's meeting, including providing a speaker from SPI Dynamics on February 21st.

New OWASP Tools Available - Jan 2008 Four new OWASP tools are available. OWASP Enterprise Security API helps organizations get organized about application security, OWASP CSRFTester tests for CSRF flaws, OWASP CSRFGuard stops CSRF attacks, and the fantastic new Anti-Samy component allows safe posting of rich content.

Member Survey
Please take time to complete the member survey to help improve the value the Chapter brings to the Boulder/Front-Range community.

What's a Typical Agenda for the Chapter?
6-6:30 - pizza and beverages provided by a sponsor

6:30-6:40 - intro to OWASP and Chapter Business

6:40-7:35'ish - presentation, demonstration, or workshop

7:35'ish - Q & A

after Q & A - adjourn to less formal environment

What should I expect to see at a bOWASP meeting?
Each speaker will be encouraged to cover: - demonstration of the threat ( "look! I got EVERYONE'S credit card #!") - overview/sample of vulnerable code, preferably in PHP, Java, or .Net env. - some details regarding how to correct the code - some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC - additional tools and references

February 2008 Meeting Notes - Michael Sutton - SQL Injection
The sponsor was HP, and the speaker was Michael Sutton of HP/SPI Dynamics. Topics included:

1. Data tampering via SQL injection (verbose and blind)

2. Guidance regarding WHAT TO DO and WHAT RESOURCES ARE AVAILABLE for input validation (aka data validation).

3. SQL injection against AJAX

4. Intro and results of Michael Sutton's FUGGLE project

Michael's slide deck is available in PDF format

Michael Sutton is the co-author of "Fuzzing : Brute Force Vulnerability Discovery" and the Security Evangelist for SPI Dynamics, recently acquired by HP. Michael is responsible for identifying, researching and presenting on emerging issues in the web application security industry. He is a frequent speaker at major information security conferences, has authored much literature and is regularly quoted in the media on various information security topics. Michael is also a member of the Web Application Security Consortium (WASC), where he is project lead for the Web Application Security Statistics project.

Prior to joining SPI Dynamics, Michael was the Director for iDefense Labs, a team of world class researchers tasked with discovering and researching security vulnerabilities. Michael also established the Information Systems Assurance and Advisory Services (ISAAS) practice for Ernst & Young in Bermuda. He holds degrees from the University of Alberta and The George Washington University.

Proposed SQL injection mitigation update

All 2008 meeting notes

Aman Garg - Web App Protection, Tips for QA and Testing (January 2008)

2007 Meeting Notes
All 2007 Meeting Notes

Patrick White, Aspect-Oriented Programming (Nov 2007)

Jeremiah Grossman, Top 10 Web Attack Techniques, their potential impact, and strategies to protect your company

Pizza Delivery At Corporate Express
1. Papa John's 5160 W 120TH AVE  Broomfield, CO 80020-3305

Phone: (303)469-6262

Delivery Hours: 10:00 am - 11:30 pm

Distance: 4.07 miles

menu as of 4/17/2008

2. Richie's Neighborhood Pizzeria (720) 887-3434 DON'T KNOW IF THEY DELIVER but they're in FlatIrons mall.

Well-written, well-referenced SQL injection article

Cool MS Ace Team Blog

https://www.owasp.org/index.php/About_OWASP

https://www.owasp.org/index.php/How_OWASP_Works

https://www.owasp.org/index.php?title=How_OWASP_Works&diff=22690&oldid=15689 (this is a previous version of the 'How OWASP Works' page which contains some ideas about the future)

https://www.owasp.org/index.php/OWASP_brand_usage_rules

https://www.owasp.org/index.php/Chapter_Rules

https://www.owasp.org/index.php/Chapter_Leader_Handbook

https://www.owasp.org/index.php/Category:Chapter_Resources

http://www.owasp.org/index.php/Tutorial#Editing_OWASP

And finally, if you haven't seen this amazing page created by Sebastien a while back with descirptions and links to past OWASP presentations, you must check it out now: http://www.owasp.org/index.php/OWASP_Education_Presentation

Of particular interest: https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc

Recruiting Tips - if you need to hire a WebAppSec or AppSec specialist
1. Join this chapter's mailing list and publish to the chapter. 2. Publish to Security Focus's jobs list. 3. Publish to the Yahoo CISSP-jobs list. 4. Publish to RMIUG-Jobs 5. Show up at a meeting, schmooze, and let it be known during the pizza or chapter business portion that YOU ARE HIRING.