Boston

Welcome to the OWASP Boston Chapter
Boston

To find out more about the Boston chapter, just join the OWASP Boston mailing list.

We meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm.

Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the OWASP Boston mailing list. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers.

Information and an RSS feed for meeting updates about this and other Boston area user groups can be found at Boston User Groups.

Location
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ( Unless a speaker can only present another night), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA.

From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C.

Boston OWASP Board
President

Jim Weiler 781 356 0067  jim dot weiler at starwoodhotels dot com

Program Committee

Mark Arnold

Jim Weiler 781 356 0067  jim dot weiler at starwoodhotels dot com

Local Chapter Information
The chapter shipping/mailing address is:

OWASP Boston 35 Wachusett Dr Lexington, MA. 02421

Reviews
Reviews of security podcasts

Next Meeting   Wed Dec. 3
6:30

Announcements, stories from the trenches

I’m going to add a ‘Stories from the trenches’ section to the meeting before the main presentation. The idea is that attendees have lots of info and experiences that are useful to other attendees, much of which can be shared, but we don’t want to ask people to spend time organizing a presentation. So I’ll ask the group about various aspects of web app security and see if we can get some anecdotes. They can be technical, comical, tragic, instructive, whatever. They can be anonymized. You can think about what you might say as you drive to the meeting. I’ll have some of my own. Then we can vote on the most deserving (you make up your own criteria) and the winner will get some Microsoft stuff (books, software etc.).

7:00 Main Presentation

Tamper-Proofing Web Applications

The majority of the data passed to a typical web application never originates from the user. Embedded inputs such hidden form fields, selectable form elements, cookies, and URL parameters all originate within the application yet these values are often vulnerable to tampering and manipulation attacks. In theory web application firewalls can easily prevent these attacks, but in reality they rarely do.

This presentation will discuss how HTTP response analysis can be used by web application firewalls to provide instant real-time protection against tampering and manipulation attacks.

Freely available software that can be used to implement this defense technique will be demonstrated and compared with other common web application firewall technologies.

Speaker Bio

Brian Holyfield is a founding member of Gotham Digital Science. He has worked in the realm of information security for over 9 years, and has deep experience identifying and exploiting software security flaws. Brian is a frequent speaker at various security conferences and was a contributing author for “Network Security Tools” (O'Reilly), where he outlined how to build automated vulnerability detection and exploit tools for web-based applications.

Past Meeting Notes
Feb 2005

Application Security Inc. PowerPoint slides for the Anatomy of a Database Attack.

March 2005

Joe Stagner: Microsoft Let's talk about Application Security

April 2005

Jonathan Levin - Of Random Numbers

Jothy Rosenberg, Founder and CTO: Service Integrity - Web Services Security

May 2005

Patrick Hynds, CTO: Critical Sites - Passwords - Keys to the Kingdom

June 2005

Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security Overview of Application Security Tools

July 2005

Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security]

September 2005

Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security

October 2005

Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - Identity Federation : Prospects and Challenges

Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways

November 2005

Robert Hurlbut, Independent Consultant Threat Modeling for web applications

December 2005

Paul Galwas, Product Manager: nCipher Enigma variations: Key Management controlled

January 2006

David Low, Senior Field Engineer: RSA Practical Encryption

February 2006

Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source

March 2006

Mateo Meucci; OWASP Italy Anatomy of 2 web attacks

Tom Stracener; Cenzic Web Application Vulnerabilities

April 2006

Dennis Hurst; SPI Dynamics: A study of AJAX Hacking

Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints!

May 2006

June 2006 Imperva - Application and Database Vulnerabilities and Intrusion Prevention

Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool

September 2006 Mike Gavin, Forrester Research:   Web Application Firewalls

November 2006

January 2007 Dave Low, RSA the Security Division of EMC:   encryption case studies

March 2007 Jeremiah Grossman,  CTO Whitehat Security:   Top 10 Web Application Hacks of 2006

June 2007 Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries

Danny Allan; Director, Security Research, Watchfire

Topic: Exploitation of the OWASP Top 10: Attacks and Strategies

September 2007

Day of Worldwide OWASP 1 day conferences on the topic "Privacy in the 21st Century"

October 2007

George Johnson, Principal Software Engineer EMC; CISSP

An Introduction to Threat Modeling.

Jim Weiler CISSP

Web Application Security and PCI compliance.

November 2007 Tom Mulvehill Ounce Labs

Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles

Ounce presentation

Deember 2007 Scott Matsumoto; Principal Consultant, Cigital

Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security

Cigital Presentation

March 2008 Chris Eng; Senior Director, Security Research, Veracode

Description – Attacking crypto in web applications

June 2008 Main Speaker - Jeremiah Grossman; Founder and CTO, Whitehat Security

Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript

Main Topic - Business Logic Flaws: How they put your Websites at Risk