Netherlands

[http://s1.shard.jp/galeach/new189.html recipe for chicken parmasian ] [http://s1.shard.jp/frhorton/9nls8flts.html african lodge luxury safari ] [http://s1.shard.jp/losaul/online-clothing.html diggers australia pty ltd ] [http://s1.shard.jp/frhorton/78vbl98c2.html south african music composer ] site [http://s1.shard.jp/olharder/autopsy-picture.html maxson automatic machinery ] [http://s1.shard.jp/losaul/australian-residency.html the mental health act of south australia ] [http://s1.shard.jp/losaul/australia-physiotherapy.html mdbsaustralia.com ] [http://s1.shard.jp/galeach/new41.html asia pacific academy of ophthalmology ] [http://s1.shard.jp/bireba/symantec-antivirus.html how to completely remove norton antivirus 2004 ] [http://s1.shard.jp/galeach/new53.html blacks on asians pics ] [http://s1.shard.jp/bireba/norton-antivirus.html manually uninstall symantec antivirus corporate 9 ] [http://s1.shard.jp/bireba/avg-antivirus.html antivirus internet worm protection signature updates ] [http://s1.shard.jp/bireba/notan-antivirus.html how to uninstall norton antivirus 2003 ] [http://s1.shard.jp/losaul/scoutsaustralia.html surf shirts australia ] [http://s1.shard.jp/bireba/norton-antivirus.html norton internet security mac 30 antivirus firewall privacy ] avast avg antivirus http [http://s1.shard.jp/losaul/property-for.html australian working visa requirements ] [http://s1.shard.jp/galeach/new186.html define aphasia ] domain [http://s1.shard.jp/bireba/download-antivirus.html avg antivirus definition download ] index [http://s1.shard.jp/bireba/symantec-antivirus.html norton antivirus 2005 serials and cracks ] url [http://s1.shard.jp/olharder/autograph-boxing.html after market automotive association ] url map map [http://s1.shard.jp/bireba/panda-titanium.html antivirus free trial download ] [http://s1.shard.jp/losaul/port-hedlund-australia.html official site of australian open ] [http://s1.shard.jp/frhorton/cluquehu7.html african animal savannah ] [http://s1.shard.jp/losaul/job-agencies-sydney.html deception bay australia ] [http://s1.shard.jp/losaul/australia-bank.html technical bookstore australia ] [http://s1.shard.jp/frhorton/jxumdkxje.html african american christian org ] [http://s1.shard.jp/frhorton/o5mgjok5p.html great white shark tours south africa ] [http://s1.shard.jp/olharder/pyles-auto-sales.html expressway autoworld ] [http://s1.shard.jp/galeach/new142.html dysplasia of the hip ] [http://s1.shard.jp/galeach/new16.html asian gonzo ] symantec antivirus 10.0 corporate edition client for 64 bit [http://s1.shard.jp/frhorton/i13wxjnjb.html carnivores restaurant south africa ] [http://s1.shard.jp/bireba/maafee-antivirus.html panda antivirus serial ] [http://s1.shard.jp/frhorton/9mxpl8xy1.html south africa kruger lodge ] [http://s1.shard.jp/losaul/bb-guns-for-sale.html netball australia home ] [http://s1.shard.jp/bireba/antivirus-stop.html how to uninstall norton antivirus 2003 ] [http://s1.shard.jp/galeach/new37.html asia net news ] [http://s1.shard.jp/losaul/quiksilver-pro.html enzed australia ] [http://s1.shard.jp/olharder/automation-building.html auto college mechanics ] backpacker accommodation sydney australia [http://s1.shard.jp/galeach/new31.html asian slaw ramen ]

Call for Speakers
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too! Presentations: Are you working on interesting subject, you would like to share your experiences with the OWASP community. Any topic related to application security will be appreciated! VAC, Vulnerability, Attack, Countermeasure: The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!

Sponsorship of a local chapter meeting
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events. Hosting a local chapter meeting: To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees Sponsorship of a local chapter meeting: You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees

Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org 

Meeting schedule 2009
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule. April 9th -- Time        : 18.00 - 21.30 Main Topic  : Knowing Your Enemy Presentations: Modern information gathering; how to abuse search engines        Dave van Stein VAC Cross-site scripting                                         Martin Visser Beveiligingsaspecten van webapplicatie-ontwikkeling              Wouter van Kuipers Location    : Lange Dreef 17 4131 NJ Vianen Sponsor     : Sogeti Nederland B.V.

May 28th -- Time        : 18.00 - 21.30 Main Topic  : AppSec Europe 2009 Presentations: AppSec-EU 2009                                                   Sebastien Deleersnyder, Telindus VAC Cross-Site Request Forgery                                   Niels Teusink Open session / discussion about subjects brought forward by               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak Location    : ASR Nederland MD0.60 - Auditorium Smallepad 30 3811MG Amersfoort Sponsor     : ASR Nederland

September 24th -- Time        : 17.30 - 21.30 Main Topic  : Presentations: Location    : Sponsor     :

December 10th -- Time        : 17.30 - 21.30 Main Topic  : Presentations: Location    : Sponsor     :

Registration If you want to attend, please send an email to: bert.koelewijn@owasp.org All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings. NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.

Meeting Schedule May 28th 2009: AppSec Europe 2009
Summary The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees.

18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) 

18.45 - 19.45 AppSec-EU 2009 (Sebastien Deleersnyder, Telindus)  Update on the AppSec-EU 2009: OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations.

19.45 - 20.00 Break 

20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT)  CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.

Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations.

20.30 - 21.15 Open session / discussion (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak)  Open session / discussion about subjects brought forward by the attendees.

The Announcement of this meeting: [[Media:Announcement OWASP-NL May 28th 2009.pdf]] The flyer of this meeting: [[Media:owasp_NL_may2009.pdf]]

Meeting Schedule 9th April Knowing Your Enemy
Summary The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions.

18.30 Ã¢ÂÂ 18.45 Introduction (OWASP organization, projects, sponsor)  18.45 - 19.30 Modern information gathering; how to abuse search engines            Dave van Stein ([[Media:20090409_passsive_reconnaissance_Dave_van_Stein.pdf]]) Great generals already know the key to success is "knowing your enemy". In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist.

19.30 - 20.00 VAC Cross-site scripting     Martin Visser ([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]]) Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day "Application Security Ã¢ÂÂ Microsoft development" course both within and outside Sogeti.

20.00 - 20.15 Break  20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers  ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]]) Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieÃÂ«n uit te kunnen voeren. Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security.

Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.

The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]

Past Events

 * Events held in 2008
 * Events held in 2007
 * Events held in 2006
 * Events held in 2005