Welcome to the OWASP Rochester Local Chapter
Welcome to the local Rochester chapter homepage. The chapter leader is Ralph Durkee
Upcoming Meetings & Events
- Rochester Security Summit
Date: Oct 5-6, 2016
OWASP Track (day 2):
- Keynote: Jeremiah Grossman
- Introduction to Application Security and OWASP Top 10 Risks (Ralph Durkee & John King)
- Common Developer Crypto Mistakes (Kevin W. Wall)
- #DevOpsSec – Killing the Buzz? (Jason Ross)
- Web Application Firewall Evaluation with DevOps, SDLC and the New OWASP Core Rule Set (Chaim Sanders)
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.
The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found here. The discussion mailing list can be found here. You can also review the e-mail archive of the announcement and discussion lists to see what folks have been talking about. Please make sure you are subscribed to the announcement list to receive any last minute meeting info.
Meeting Dates & Location
Dates: Meetings are announced via the announcement mailing list and on the website. Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.
If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.
- OWASP Rochester Social Event (8/11/16, MacGregors')
Please join the Rochester OWASP chapter for a social event August 11th at MacGregors' in Henrietta.
Come out and discuss your favorite topics in application security! Appetizers will be provided.
When: Thursday, August 11 at 5:30pm
Where: MacGregors' Grill and Tap Room (300 Jefferson Rd, Rochester, NY)
- Understanding and Preventing Cross-Site Request Forgery Attacks
Date: Feb 10th, 12 Noon - 1:30pm Location: Univ of Rochester College Town – Building 3
- John King
- Slides http://www.johnnking.com/slides/csrf/
Ranked #8 on the OWASP Top 10, “Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.” (OWASP Wiki)
CSRF vulnerabilities are commonplace and easily missed by developers who are unfamiliar with this class of attack. Unlike injection vulnerabilities, they do not become apparent during testing unless you know exactly what to look for. This session will provide an introduction to CSRF vulnerabilities, and will include an attack demonstration and practical examples that prevent this type of vulnerability.
John is a web application developer with 10+ years of experience, with a focus on product management, user-experience, and application security. He has recently joined RIT ITS as a Senior Web Programmer / Analyst. He also serves as an officer of the Rochester chapters of OWASP and ISSA, and helps plan the annual Rochester Security Summit.
- NodeJS Security
Date: Nov 6th 12 noon - 1:30pm Location: Univ of Rochester College Town – Building 3
- Jason Ross
NodeJS has become an industry standard for deploying agile web applications. This talk provides an introduction to NodeJS – what it is, what it isn’t, how to get it running, and common elements that get deployed with Node (such as Grunt and Bower). With a firm understanding of the platform, we'll then examine common problems and security risks associated with NodeJS applications, as well as what options are currently available to secure and audit NodeJS projects.
Jason Ross is a Senior Consultant specializing in web application testing, Android application and device testing, and incident response management. He has provided network and application vulnerability assessment & penetration testing to a wide range of clients, including US Government agencies and Fortune 100 companies. He has also developed and delivered training tools and programs to major clients on topics such as advanced mobile penetration testing and forensic techniques.
Jason has a background in network incident response, forensic analysis and Unix & Windows platform engineering. He is an independent security researcher, and has spoken at numerous security conferences, including BlackHat DC, BSides Las Vegas, DEF CON Skytalks, and various regional conferences. Jason is also an active participant in the anti-malware community, and works with several highly vetted trust groups to track, monitor, and mitigate malicious Internet activity.
- Introduction to OWASP Application Security – Building and Breaking Applications
Date: Sept 18th 12 noon - 1:30pm
- Ralph Durkee, Principal Security Consultant, CISSP, C|EH, GSEC, GCIH, GSNA, GCIA, GPEN
Application Security continues to be the most challenging and demanding area for securing our information. Even large organizations like Google and Microsoft that are well funded and have a strong commitment to security, have difficulty developing secure software. Too often, when a vulnerability is found and a software patch is provided, the initial patch is soon found to be lacking and is still vulnerable. The initial patch for the recent Android StageFright vulnerability is a prime example. So yes, writing secure software is a serious challenge, but it can be done. Knowing how to build secure software and how to break insecure software can be both fun and profitable. There is and will continue to be a growing demand for developers and application penetration testers that “get it”. We'll discuss specific examples from the OWASP Top 10 and the OWASP secure coding principles about how things can go very wrong, and what we can do to keep the bad guys out.
- OWASP Top 10 - https://www.owasp.org/index.php/Top10#OWASP_Top_10_for_2013
- OWASP Secure Coding Principles - https://www.owasp.org/index.php/Secure_Coding_Principles
Presentation Slides: https://www.owasp.org/images/e/ec/Durkee_OWASP_2015_09_AppSec.pdf
- Application Security for Agile and Continuous Delivery
Date: May 12th, 2015 6pm
- Douglass Wilson, IBM Distinguished Engineer
- CTO for Vulnerability, Risk and Compliance Products IBM Security Systems IBU
- Free food and drink, provide by our meeting Sponsor, IBM
- Mulconry's Irish Pub, 17 Liftbridge Lane East, Fairport, NY 14450
- Hands-on Ethical Hacking
- Preventing and Exploiting Stack Overflow Vulnerabilities
Date: Apr 15, 2015 5:30pm
- Ralph Durkee
- We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities.
- In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow.
- We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.
- Rochester Security Summit
Date: Oct 7-8, 2014 8am - 4:30pm Topics:
- Top Ten Web Defenses (Jim Manico)
- Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)
- Docker and Linux Containers for Infosec Professionals (Matt Kaar)
- Building a Software Security Program (Kuai Hinojosa)
Location: Hyatt Regency, Rochester, NY 14604
- June 20 2014 Meeting
Topic: Security Development Lifecycle Speaker: Larry Kovnat (CISSP, CISM) Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
Speaker: Larry Kovnat (CISSP, CISM) Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
- April Meeting 2013
Topic: Ethical Hacking as a Professional Penetration Testing Technique
Speaker: Ralph Durkee, Durkee Consulting
- May 2012
Mercury Networks Security Summit
Tpoic: Mozilla's Content Security Policy
Speaker: Lou Leone
- May 2011 Meeting
Michael Coates webinar on Attack-Aware Applications.
- May 5, 2011
MercuryFest Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer Topic: SSL Man-in-the-Middle and Spoofing Attacks
- March 2011 Meeting
Topic: Pastebin Scrapping
Speaker: Silas Cutler, Global Crossing, Security Architect
- January 2011 Meeting
Topic: State of OWASP and the State of Web Application Security
Speaker: Ralph Durkee, Durkee Consulting
- August Meeting 2010
Topic: Man in the Middle Attacks: SSL Spoofing
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting
- June Meeting 2010
Topic: Client Side Exploits 101
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS
- May Meeting 2010
Topic: New Techniques in Application Intrusion Detection
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.
- February Meeting 2010
Ralph Durkee presented a recap of the recent AppSec conference in DC.
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security.
- Oct 29-30 2008 - Rochester Security Summit 2008
- The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month. This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.
Visit Rochester Security Summit Site for details.
Mercury Networks Security Symposium May 2012 I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone Presentation - PPTX
February Meeting 2010 DC AppSec Conference Recap by Ralph Durkee PPT
October Hackerfest 2009 Introduction to OWASP Rochester by Ralph Durkee, Lou Leone PPT
May OWASP 2009 Key Management - One Perspective by Lou Leone PPT
May IEEE 2009 Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati PPT
January 2009 Paranoid Programming Practices, by Lou Leone and Aaron Witt PPT
May 2008 Database Encryption, by Ralf Durkee PPT
January 2008 SQL Injection and Dynamic SQL, by Andrea Cogliati ZIP
September 2007 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee PowerPoint
October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint
April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF
February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF
February 2006 Secure e-mail, by Thomas Bullinger PDF
January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF
February 2005 Insecure Storage, by Chris Karr PowerPoint
November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint