Rochester

Welcome to the OWASP Rochester Local Chapter
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]

Rochester OWASP Chapter meeting
Date: Sept 18th 12 noon - 1:30pm

Location: Univ of Rochester College Town – Building 3
 * (2nd floor above Constantino’s Grocery)
 * Parking is for 2 hours outside the grocery store
 * http://www.collegetownrochester.com/map-directions/

Cost: The meeting is free.

To Register:Please RSVP by Sept 10th to Ralph.Durkee @ OWASP.org.

There will be Pizza provide.

Presentation: OWASP Application Security – Building and Breaking Applications

Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.
 * OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013
 * OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles

Come join your friends and bring your colleagues for a great presentation, food, good drink, and fun conversation.

Speaker: Ralph Durkee

Ralph Durkee is the principal security consultant and owner of Durkee Consulting, Inc since 1996. Ralph started the OWASP Rochester, NY chapter in 2004 and served as founding officer and president for the Rochester ISSA chapter and the annual Rochester Security Summit. He routinely performs network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of hands-on technical experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 & SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.

Participation
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found here. The discussion mailing list can be found here. You can also review the announcement and discussion e-mail archives to see what folks have been talking about. Please make sure you are subscribed to the announcement list to receive any last minute meeting info.

Local Officers
 
 * President: Vacant
 * Vice President: [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]
 * Treasurer: [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]
 * Secretary: Appointed by Event Coordinator at each meeting.
 * Event Coordinator: Vacant
 * Communications and Chapter OWASP Evangelist: Vacant
 * Webmaster: [mailto:duane.peifer@owasp.org Duane Peifer]
 * Mail List Administrator: [mailto:duane.peifer@owasp.org Duane Peifer]

Meeting Dates & Location
Dates: Meetings are announced via the announcmenet mailing list and on the website.

Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.

If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.

Past Events
Date: Sept 18th 12 noon - 1:30pm
 * Introduction to OWASP Application Security – Building and Breaking Applications
 * Speaker: Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN

Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.


 * OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013
 * OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles

Date: May 12th, 2015 6pm
 * Application Security for Agile and Continuous Delivery
 * Speaker: Douglass Wilson, IBM Distinguished Engineer
 * CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU
 * Free food and drink, provide by our meeting Sponsor, IBM
 * Location: Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450

Date: Apr 15, 2015 5:30pm
 * Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities
 * Speaker: Ralph Durkee
 * We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities.
 * In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow.
 * We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.

Date: Oct 7-8, 2014 8am - 4:30pm Topics: Location: Hyatt Regency, Rochester, NY 14604
 * Rochester Security Summit
 * Top Ten Web Defenses (Jim Manico)
 * Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)
 * Docker and Linux Containers for Infosec Professionals (Matt Kaar)
 * Building a Software Security Program (Kuai Hinojosa)

Topic: Security Development Lifecycle Speaker: Larry Kovnat (CISSP, CISM) Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
 * June 20 2014 Meeting

Speaker: Larry Kovnat (CISSP, CISM) Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604

Topic: Ethical Hacking as a Professional Penetration Testing Technique Speaker: Ralph Durkee, Durkee Consulting https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf
 * April Meeting 2013

Mercury Networks Security Summit Tpoic: Mozilla's Content Security Policy Speaker: Lou Leone https://www.owasp.org/images/9/95/2012_CSP.pptx
 * May 2012

Michael Coates webinar on Attack-Aware Applications. https://owasp.webex.com/owasp/ldr.php?AT=pb&SP=MC&rID=87764002&rKey=14191b8f8c73dabc
 * May 2011 Meeting

MercuryFest Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer Topic: SSL Man-in-the-Middle and Spoofing Attacks
 * May 5, 2011

Topic: Pastebin Scrapping Speaker: Silas Cutler, Global Crossing, Security Architect
 * March 2011 Meeting

Topic: State of OWASP and the State of Web Application Security Speaker: Ralph Durkee, Durkee Consulting
 * January 2011 Meeting

Topic: Man in the Middle Attacks: SSL Spoofing Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting
 * August Meeting 2010

Topic: Client Side Exploits 101 Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS
 * June Meeting 2010

Topic: New Techniques in Application Intrusion Detection Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.
 * May Meeting 2010

Ralph Durkee presented a recap of the recent AppSec conference in DC. Andrea Cogliati gave a talk on Identity Federation and Claim-based Security.
 * February Meeting 2010


 * Oct 29-30 2008 - Rochester Security Summit 2008


 * The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month. This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.

Visit Rochester Security Summit Site for details.

Past Presentations
Mercury Networks Security Symposium May 2012 I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx| Presentation - PPTX]]

January Meeting 2011 State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]

August Meeting 2010 Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]] August Meeting 2010 Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]

May Meeting 2010 New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]] May Meeting 2010 Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]

February Meeting 2010 DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]

October Hackerfest 2009 Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]

September OWASP 2009 Securing Apache Web Servers with Mod Security & CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]

May OWASP 2009 Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]

May IEEE 2009 Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]

January 2009 Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]

May 2008 Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]

January 2008 SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]

September 2007 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]

October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint