Jump to: navigation, search

OWASP Ngaoundèré

Welcome to the Ngaoundèré chapter homepage. The chapter leader is Franklin Tchakounté.
Click here to join the local chapter mailing list.


OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.


Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


First Meeting - 22 February 2016

OWASP Ngaoundéré held its first meeting on the 22 February 2016 at the Lab room of the Computer Science of the University of Ngaoundéré. The objective was to present what is OWASP and its objectives. This has been done by the manager. He also presented the vision to educate people about Web application security and the advantages to adhere. We have had three females and 10 males, wo participated to the rendez-vous.

The next meeting is taken for the 14 may of 2016 during which we should define our activities and member roles.

Second Meeting - 04 May 2016

This meeting started at 3:30 p.m. We elected a treasurer and defined that our activities, this year, are around SQL injections attacks, Web server Misconfigurations, Browser based attacks, Reverse engineering and Phishing. A research member, Fokou Michel, made a great presentation about SQL injections attacks and what vulnerabilities the attackers exploit. Then, we made working groups to experiment with example SQL injections in order to be able to explain to others during a public event. We planned two public events: one on July, 15-16 and November, 05.

 Meeting preparing the event of July, 16

We held a meeting on the 24 June 2016, during which we plan activities of the event. Below are those activities:

First Aspect: Web attacks: SQL Injection and cross-scripting

Activity 1 : Presentation of concepts around SQL Injection and cross-scripting: By Michel Fonkou

Activity 2 : Practicals on SQL Injection and cross-scripting: By Ndjeumou Roger

Activity 3: Practicals on detecting SQL Injection and cross-scripting: By Kwenne

Second Aspect: Integrity and Password on Internet

Activity 1: Automatic and secure Management of Passwords on Internet: Ms Atsafack Blondelle

Activity 2 : Verification of data integrity on Internet: Dr Tchakounté

Third Aspect: Cybercriminality

Activity 1: Identification of phishing and vishing and countermeasures: M. Saoungoumi rodrigue

Activity 2: Identification of drive-by-downloads attacks and countermeasures: Dr Dayang Dayang


 Meeting - 24 June 2016

Dear members, we invite you a meeting to discuss the preparation of the July, 15-16 event. This meeting will be hold at 3 p.m at the usual place, the lab room.


Welcoming session - 30 October 2017 

Welcoming new members and fixing how activities will be executed.

Practice Lab - 06 November 2017

Kali installation, components and Tor. Next Monday, 13.11.2017 we plan to introduce ethical hacking.

Anonymity with Tor and Proxychains

Waouh! Congrats to everybody! After several meetings every member is able to practice anonymity with Tor and Proxychains.



First Event

Owasp Ngaoundéré Event in July, 16. Register via the link below.



Family picture of the event.jpg

For more pictures, get there


OWASP Ngaoundere to NdereCamp 2017

Our participation there:

  1. Introduction and Presentation of OWASP : By the leader
  2. Announcement of our January's event: By the leader

By members :

  • Anonymity on Internet
    • Motivations for users and administrators?
    • Definitions: Proxy, Proxychains, Types of Chains (Dynamic, Strict, Random)
  • Tor
    • How does it works?
  • Anonymity with Tor and Proxychains - Practical
Upcoming event 

To be coming: Ethical hacking and penetration testing to change minds on the 13.01.2018 at ICT Centre Ngaoundéré.