Phoenix

CFP
Would you like to speak at an OWASP Phoenix Meeting? Call for Papers (CFP) is NOW OPEN. To speak at upcoming OWASP Phoenix meetings please submit your BIO and talk abstract via email to [mailto:pete.roalofs@owasp.org Pete Roalofs] or [mailto:a.wilson82@gmail.com Andrew Wilson]

Local News
OWASP Phoenix 2011 Meetings

Meetings are on the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour.

Afterward, we'll head to a local watering hole for socializing and fun.

The meeting are located at:

University of Advancing Technology 2625 W. BASELINE RD. TEMPE, AZ 85283-1056

Monthly Meeting - Tuesday May 3rd 2011 6:30
OWASP Phoenix invites you to it's May meeting! Tuesday May 3rd 2011 6:30 - 7:30 PM at University of Advancing Technology. The meetings are always free, unfortunately the drinks aren't.

Improving your Fu
Speaker: Andrew Wilson Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation.

Bio: Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. 

2011 Meetings Calendar
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.


 * May - Improving your Fu
 * June - To Be Announced

Resources
Archived pages on Phoenix/Tools and Phoenix/ToolsProfile

This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every month, typically with one or two speakers at each meeting.

What talks would you like to see?
Please Update


 * Certificates
 * Application Firewalls
 * PHP
 * Security ROI
 * Penetration Testing Methods
 * AJAX
 * Cryptography in Web Applications
 * Reversing ActiveX controls
 * Using Local Proxies
 * Browser Safety / Security
 * Web services security: XML/SOAP/WSDL

Previous Meetings
Exploitation Redux and Bug Bounties - Michael Brooks

Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email.

List of bounty winners and a lot of blog links: http://www.google.com/corporate/halloffame.html Interesting SMTP based XSS http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ XSS via event handlers: http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google Good examples of strange XSS: http://google-gruyere.appspot.com/ My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability) http://www.exploit-db.com/author/?a=628

Bio: Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch.

SharePoint Hacking - Advanced SharePoint Security Tools and Tips     -Francis Brown

http://www.stachliu.com/resources/tools/sharepoint-hacking-diggity-project/

Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments.

This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are: • Identifying vulnerable SharePoint applications using public search engines such as Google and Bing • Gaining unauthorized access to SharePoint administrative web interfaces • Exploiting holes in SharePoint site user permissions and inheritance • Illustrating the dangers of granting excessive access to normal user accounts • Pillaging Active Directory via insecure SharePoint services • Attacking 3rd party plugins/code within SharePoint • And much more…

Bio:

Appsec Design Reviews Reloaded - Andre Gironda The best place to start in the software lifecycle is during the design phase. Workflow tools exist for SDL processes, build servers, penetration-testing activities, and many other application security checkpoints. However, very few tools and techniques exist or are readily available when performing application security design reviews. The full process of application security should be agreed upon during the design phase by the security department and all relevant application development teams. The direction of the projects and the patterns used in the application architectures can also be augmented from an application security perspective. This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies, such as managed code frameworks. Bio: Andre has contributed to many OWASP documents and has been working in the appsec space for almost 5 years. He is a local to the Phoenix area and has presented on application security topics recently at BSides, OWASP, and Toorcon events.

Professional Burping

Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions. Andrew Wilson's Bio:

Debugger Basics: Software Cracking and Buffer Overflows Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before "warez and keygens": bypassing a serial number based registration for software, the most basic form of software cracking.

Bio: Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. Scott White Senior Penetration Tester www.securestate.com http://securestate.blogspot.com

Database Security and Encryption, Adrian Lane

Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on "the other side" as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his "network hair" and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University.

masSEXploitation, Mike Brooks  This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines.

Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public.

http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email) http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&gt;sqli(insert)-&gt;persistant xss on front page)

Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis

It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time.

Application Security Tools  - Web Application Proxy Editors and Scanners - Andre Gironda  - Adam Muntner Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell

 â and other web+network trust issues â Andre Gironda

In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one "origin" from getting or setting properties of a document from a different "origin". It was designed to protect browsers from executing code from external websites, which could be malicious.

XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break?

Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian

Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.

Web Application 0-Day â Jon Rose

Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.

Discovering Web Application Vulnerabilities with Google CodeSearch

Building Application Security into the SDLC - Adam Muntner

Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to "bake security in" rather than "ice it on."