Difference between revisions of "Boulder"

From OWASP
Jump to: navigation, search
(Undo revision 60663 by Andylew (Talk))
Line 3: Line 3:
 
<paypal>Boulder</paypal>
 
<paypal>Boulder</paypal>
  
== '''Next Meeting - XSS Lab - Thurs, May 21st, 6 PM, Staples''' ==
+
== '''Next Meeting - Chapter Planning Get-Together - Thurs, April 23rd, 6 PM, Staples''' ==
Please join the Boulder OWASP Chapter on Thursday, May 21st, 2009 at Staples for a XSS lab.   
+
Please join the Boulder OWASP Chapter on Thursday, April 23rd, 2009 at Staples for a chapter planning meetingAs Kathy says "it's your chapter" so let's figure out what our chapter is doing the rest of this year.  Feel free to post your ideas on the Colorado 2009 [https://www.owasp.org/index.php/Colorado_Planning_2009 PLANNING PAGE]
  
THREE levels of labs - beginner, intermediate, and advanced.
+
=== Planning for 2009 - NOT a presentation - a gathering to define the Chapter's future ===
  
=== Cross-site scripting '''LAB''' - Beginner, Intermediate, and Advanced ===
+
Who, what, where, when, why, how to get it done in 2009.   
 
+
Get involved!
Lab to explain how to attack vulnerable sites –we will use three different examples and
+
Spend  one half hour on each:  Basic attacks, intermediate and advanced.
+
Teacher TBA.
+
We will be using the OWASP Live CD and will have them available.
+
Must have laptop with CD player. 
+
Meeting will be at '''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title One Environmental Way, Broomfield, Co. 80021]'''
+
Brown bag or we can order pizza when everyone gets there.
+
6pm to 7pm dinner and Lab from 7pm to 8:30
+
Drinks at Gordon Biersch after the labTopics up for discussion (we’ll choose one)
+
 
+
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace
+
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]
+
  
 
=== Directions to Staples: ===
 
=== Directions to Staples: ===
  
'''Staples: [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title One Environmental Way, Broomfield, Co. 80021]'''
+
   
 +
http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title
  
 +
 
=== Agenda ===
 
=== Agenda ===
* 6 to 7:00 Dinner @ [http://maps.google.com/maps?f=q&hl=en&geocode=&q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&sll=39.935803,-105.13092&sspn=0.077395,0.144711&ie=UTF8&ll=39.926934,-105.126565&spn=0.009676,0.018089&z=16&iwloc=A Staples CE - Broomfield]  
+
* 6 to 6:40 Dinner @ [http://maps.google.com/maps?f=q&hl=en&geocode=&q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&sll=39.935803,-105.13092&sspn=0.077395,0.144711&ie=UTF8&ll=39.926934,-105.126565&spn=0.009676,0.018089&z=16&iwloc=A Staples CE - Broomfield]  
  
* 7pm to 8:30 pm Cross-site scripting lab
+
* 6:45 to 7pm Chapter Business and nominations for new Chapter Leader
Sponsor:  '''Nope, no sponsor.  It'a your chapter, BYO dinner and/or order pizza at 6'ish'''
+
  
Speaker:  tbd
+
* 7pm to 8:15pm Presentation
 +
 
 +
Sponsor:  '''TBD'''
 +
Speaker:  You, me, the rest of the folks who show up.
  
 
=== Logistics ===
 
=== Logistics ===
Please bring a wifi equipped laptop.  We recommend the [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP LiveCD].  Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined.
+
No hands-on is planned this time.  However, if there WERE "hands on" you'd need to bring a wifi equipped laptop.  We recommend the [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP LiveCD].  Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined.
  
  
Line 44: Line 36:
 
-----------------------------------------------------------------------
 
-----------------------------------------------------------------------
  
== Boulder OWASP 2009 AGENDA ==
+
SnowFROC 5 March 2009
=== May 21, 2009 Cross site scripting Lab ===
+
See the [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009 planning page] for up-to-the minute details
Lab to explain how to attack vulnerable sites –we will use three different examples and
+
 
Spend  one half hour on each: Basic attacks, intermediate and advanced.
+
== Local News ==
Teacher TBA.
+
 
We will be using the OWASP Live CD and will have them available.
+
'''Chapter Elections 19 Feb'''
Must have laptop with CD player.   
+
(Andy writes:) Andy's gone, Kathy's taking up the slack and kicking butt arranging for IBM to come do hands-on and presentation for Feb.  Kathy is planning to have chapter elections BUT you need to submit a nomination/self-nomination to kthaxton AT owasp DOT org saying who you are, what your vision is, how you plan to manage the time it takes, and why you're interested.  There is a recent precedent of Security organizations being overtaken by chowderheads and the Boulder Chapter deserves better.
Meeting will be at StaplesOne Environmental Way, Broomfield, Co. 80021
+
(Personal note from Andy - thanks VERY MUCH to all of you who wished me well.  I'm doing all right but had to step away from OWASP for the time being.  Please help Kathy with the Chapter and with SnowFROC - she is really working hard to keep things going!)
Brown bag or we can order pizza when everyone gets there.
+
 
6pm to 7pm dinner and Lab from 7pm to 8:30  
+
=== Lab Design Wiki ===
Drinks at Gordon Biersch after the labTopics up for discussion (we’ll choose one):
+
Info and Wish List for the [https://www.owasp.org/index.php/Boulder_OWASP_Lab lab] - feel free to edit...
 +
 
 +
'''Colorado OWASP Chapter Leaders Asked to Speak at ISACA Meeting'''
 +
David Campbell moderated a panel discussion; Andy was on the panel. Here's what it was about:
 +
 
 +
[http://www.isaca-denver.org/meetings/OCT_08_CHPT_MTG.shtml Challenges and Successes in Providing Business Benefits: The View from IT Audit, IT Security, and IT Compliance]
 +
 
 +
We will have a panel to discuss the problems, challenges, and successes when working to integrate business needs between the Audit, Security, and Compliance IT functional groups. These groups sometimes seem to work at cross-purposes, and to some business units, these IT groups are at odds with day-to-day business objectives. The panelists will present anecdotes and events to demonstrate challenges and successes in current and previous positions. We will also have an extended Q&A and will be soliciting your input. If you have questions or areas you would like covered, please email the Education VP ahead of time at education AT isaca-denver D0T org
 +
 
 +
Panelists:
 +
Jim Dillon, IT Audit view
 +
Doug Staubach, IT Compliance view
 +
Andy Lewis, IT Security view
 +
David Campbell, Moderator
 +
 
 +
'''Jeremy Martinez Joins bOWASP Leadership'''
 +
Jeremy has been at every bOWASP meeting since its inception in Sept 2007 and has volunteered to take on some of the responsibilities for keeping the chapter going.  Welcome Jeremy!
 +
 
 +
===PCI DSS 6.6 and 11.3 Clarification Issued===
 +
Speaking of web app security...
 +
 
 +
[https://www.pcisecuritystandards.org/pdfs/infosupp_6_6_applicationfirewalls_codereviews.pdf Clarification] WRT PCI requirement 6.6 - WAFs and Code Reviews for PCI compliance.
 +
 
 +
[https://www.pcisecuritystandards.org/pdfs/infosupp_11_3_penetration_testing.pdf Clarification] WRT PCI requirement 11.3 - pen-testing.
 +
 
 +
4/14/2008 - Interesting [http://www.aspectsecurity.com/documents/Aspect_File_Download_Injection.pdf File Download Injection research] from Jeff Williams of Aspect Security.
 +
 
 +
4/1/2008 Yes!  There's an April meeting!  List-server FUBAR; switching to manual
 +
We've been having trouble with our list serverThe last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!
 +
 
 +
2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush).  More info info to follow later...
 +
 
 +
'''How do I learn more about input validation?'''
 +
[http://www.google.com/search?q=%22input+validation%22+site%3Aowasp.org Google for Input Validation]
 +
 
 +
'''Some PHP Security Resources'''
 +
There seem to be dang few PHP security resources.  Please edit this wiki if you've got some good ones.  In the mean time, here's some stuff that looks pretty good:
 +
[http://www.sklar.com/page/article/owasp-top-ten PHP meets the Top Ten] (c2006)
 +
 
 +
[http://www.fortifysoftware.com/security-resources/rats.jsp Fortify's "RAT"] is a free tool for static code analysis...
 +
 
 +
 
 +
'''OWASP Tools Available - Jan 2008'''
 +
Four new OWASP tools are available. [https://www.owasp.org/index.php/ESAPI OWASP Enterprise Security API] helps organizations get organized about application security, [https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester] tests for CSRF flaws, OWASP [https://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project CSRFGuard] stops CSRF attacks, and the fantastic new [https://www.owasp.org/index.php/SpoC_007_-_OWASP_The_Anti-Samy_Project Anti-Samy] component allows safe posting of rich content.
 +
 
 +
== '''What's a Typical Agenda for the Chapter?''' ==
 +
6-6:30 - pizza and beverages provided by a sponsor
 +
 
 +
6:30-6:40 - intro to OWASP and Chapter Business
 +
 
 +
6:40-7:35'ish - presentation, demonstration, or workshop
 +
 
 +
7:35'ish - Q & A
 +
 
 +
after Q & A - adjourn to less formal environment
 +
 
 +
== '''What should I expect to see at a bOWASP meeting?''' ==
 +
 
 +
Each speaker will be encouraged to cover:
 +
  - demonstration of the threat ( "look!  I got EVERYONE'S credit card #!")
 +
- overview/sample of vulnerable code, preferably in PHP, Java, or .Net env.
 +
- some details regarding how to correct the code
 +
- some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC
 +
- additional tools and references
 +
 
 +
 
 +
== Notes From Previous Meetings ==
 +
 
 +
=== ''2009 meetings'' ===
 +
 
 +
 
 +
==== February 2009 - Presentation: Web Application Security: Hacking 101 ====
 +
Few can argue that web applications present a significant threat of attacks for State Government Organizations. 
 +
 
 +
In fact Gartner research indicates that 75% of today’s attacks occur at the application level and 80% of organizations will experience an application security incident by 2010.
 +
Cost of the data breach at TJX soars to $256M, Boston Globe—August 2007
 +
Monster says data loss involved 1.3 million names, Reuters—August 2007
 +
Credit Card Information Stolen from State of Indiana’s website, InfoWeek—January 2007
 +
 
 +
Are you confident this won’t happen to you?
 +
This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified.
 +
 
 +
In this session, you will learn about:
 +
 
 +
    * The importance of web application security – today's most significant online threat
 +
    * The three most common web application attacks – how they occur, and what can be done to prevent them
 +
    * Manual versus automated approaches for scanning and identifying web application vulnerabilities
 +
    * Best practices for fixing vulnerabilities once they have been identified
 +
    * Making web application security part of the entire development lifecycle
 +
 
 +
Sponsor:  IBM Rational
 +
Speaker:  Martin Stenkilde, IBM Rational Certified Senior IT Specialist
 +
Martin, a native Dane, started his professional career in  quality assurance while working for Rational Software's European Headquarter in Amsterdam.  Martin also spent time working for Zyntax, a Premier IBM Business Partner, where he functioned as the primary Performance and Security Testing Consultant for 5 years.  Martin then joined the IBM Rational Specialty team, and is a certified IBM Test Manager, WebSphere Solutions Specialist,  ISEB Professional, and holds a master certification from the Open Group.
 +
 +
 
 +
==== Jan 2009 - AppSec Capture the Flag First Meeting of 2009 - Thursday, '''January 22nd''', 2009  ====
 +
The Boulder OWASP chapter is pleased to present the [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf CTF from the New York Appsec 2008 conference].  The CTF is a series of 30 or so "challenges" which demonstrate commonly found software vulnerabilities.
 +
 
 +
The purpose of the CTF is twofoldAdvanced users can test their AppSec acumen by tackling the challenges on their own.  Beginning users can learn AppSec fundamentals as they are guided through the challenges by the friendly chapter leaders and advanced users.
 +
 
 +
Whilst seemingly technical in nature, the CTF will also be of interest to managers, developers and executives, as it provides a simple way to demonstrate and communicate the serious impact of many AppSec vulnerabilities.
 +
 
 +
 
 +
=== '''''2008 and 2007 Meeting Notes''''' ===
 +
[https://www.owasp.org/index.php/Boulderchaptermeetings2008.html All 2008 meeting notes]
 +
 
 +
[https://www.owasp.org/index.php/Boulderchaptermeetings2007.html '''''All 2007 Meeting Notes''''']
 +
 
 +
 
 +
== Chapter Leader Links ==
 +
=== 2009 Colorado Planning Page ===
 +
Colorado 2009 [https://www.owasp.org/index.php/Colorado_Planning_2009 PLANNING PAGE]
 +
 
 +
===Board Members===
 +
 
 +
Kathy Thaxton (Events Director)
 +
 
 +
Jeremy Martinez (Board Member)
 +
 
 +
Who else?  YOU?
 +
 
 +
 
 +
=== Pizza Delivery At Corporate Express ===
 +
 
 +
1. Pizza Hut (303) 466-2367
 +
6445 W 120th Ave, Broomfield, CO 80020
 +
 
 +
2. Papa John's  5160 W 120TH AVE  Broomfield, CO 80020-3305
 +
 
 +
Phone: (303)469-6262
 +
 
 +
Distance: 4.07 miles
 +
 
 +
[http://www.papajohnsonline.com/menu.jsp menu] as of 4/17/2008
 +
 
 +
3. Richie's Neighborhood Pizzeria (720) 887-3434 DON'T KNOW IF THEY DELIVER but they're in FlatIrons mall.
 +
 
 +
OWASP [http://www.owasp.org/index.php/Threat_Risk_Modeling Threat Risk Modeling] guidelines
 +
 
 +
[http://unixwiz.net/techtips/sql-injection.html Well-written, well-referenced SQL injection article]
 +
 
 +
[http://blogs.msdn.com/ace_team/default.aspx Cool MS Ace Team Blog]
 +
 
 +
https://www.owasp.org/index.php/About_OWASP
 +
 
 +
https://www.owasp.org/index.php/How_OWASP_Works
 +
 
 +
https://www.owasp.org/index.php?title=How_OWASP_Works&diff=22690&oldid=15689 (this is a previous version of the 'How OWASP Works' page which contains some ideas about the future)
 +
 
 +
https://www.owasp.org/index.php/OWASP_brand_usage_rules
 +
 
 +
https://www.owasp.org/index.php/Chapter_Rules
 +
 
 +
https://www.owasp.org/index.php/Chapter_Leader_Handbook
 +
 
 +
https://www.owasp.org/index.php/Category:Chapter_Resources
 +
 
 +
http://www.owasp.org/index.php/Tutorial#Editing_OWASP
  
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace
+
And finally, if you
 +
haven't seen this amazing page created by Sebastien a while back with
 +
descirptions and links to past OWASP presentations, you must check it out
 +
now: http://www.owasp.org/index.php/OWASP_Education_Presentation
  
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]
+
Of particular interest:
 +
https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc
  
=== June 18, 2009 Part 2 Cross Site Scripting Lab – put it into practice – how to defend against Cross site scripting ===
+
Click here [https://www.owasp.org/index.php/OWASP_Community to post events] on the OWASP Community calendar
We will defend against a basic attack, an intermediate and advanced.
+
Teacher TBA
+
Remember to bring your OWASP Live CD and your laptop with CD player.
+
Location will be at CSU in Fort Collins. Directions will be forthcoming.
+
6:30 to 7pm Dinner (Brown Bag or we will all order pizza) Lab from 7pm to 9pm.
+
  
=== No meetings July or August 2009 ===
+
=== Recruiting Tips - if you need to hire a WebAppSec or AppSec specialist ===
We will try to put up the sites that we are defending against in the June Lab so that you can have a go at them over the break.
+
1. [https://lists.owasp.org/mailman/listinfo/owasp-boulder Join this chapter's mailing list] and publish to the chapter.
  
=== September 17, 2009 Sql injection ===
+
2. Publish to [http://www.securityfocus.com/jobs Security Focus's jobs list].
We will be using SQL injection to attack using  authentication bypass, database enumeration, adding users through sql injection, Data mining, writing code
+
Teacher TBA
+
We will be using the OWASP Live CD and will have them available.
+
Must have laptop with CD player. 
+
Meeting will be at Staples: One Environmental Way, Broomfield, Co. 80021
+
Brown bag or we can order pizza when everyone gets there.
+
6pm to 7pm dinner and Lab from 7pm to 8:30
+
Drinks at Gordon Biersch after the lab. Topics up for discussion (TBA).
+
  
=== October, 22, 2009 Defense against sql injection – how to sanitize user input ===
+
3. [mailto:CISSPjobsforum@yahoogroups.com Publish] to the [http://tech.groups.yahoo.com/group/CISSPjobsforum/ Yahoo CISSP-jobs list].
Teacher TBA
+
We will be using the OWASP Live CD and will have them available.
+
Must have laptop with CD player. 
+
Meeting will be at Staples: One Environmental Way, Broomfield, Co. 80021
+
Brown bag or we can order pizza when everyone gets there.
+
6pm to 7pm dinner and Lab from 7pm to 8:30
+
Drinks at Gordon Biersch after the lab. Topics up for discussion (TBA).
+
  
=== November, 19, 2009 This Lab will put into action the SQL injection attack and the defense.  ===
+
4. Publish to local job boards such as  [http://groups.yahoo.com/group/rmiug-jobs/?v=1&t=search&ch=web&pub=groups&sec=group&slk=2 RMIUG-Jobs]
We will be using the attacks from the September meeting and then defending against them.
+
We will be using the OWASP Live CD and will have them available.
+
Must have laptop with CD player. 
+
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021
+
Brown bag or we can order pizza when everyone gets there.
+
6pm to 7pm dinner and Lab from 7pm to 8:30
+
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).
+
  
 +
5. Show up at a meeting, schmooze, and let it be known during the pizza or chapter business portion that YOU ARE HIRING.
  
=== December  - Date TBA  “Capture the Holiday flag” ===
+
6. Include the term OWASP in your ad to make it easily searchable by likely candidatesConsider verbage like:
We are planning on reserving space at a restaurantWhat better way to Capture the Flag than over a couple of beers?
+
* Ability to write code to reduce OWASP Top 10 bugs
 +
* Ability to test code for OWASP Top 10 bugs
 +
* Ability to manage Development Teams to adhere to OWASP guidelines
  
 
[[Category:Colorado]]
 
[[Category:Colorado]]

Revision as of 20:48, 12 May 2009

Contents

OWASP Boulder

Welcome to the Boulder chapter homepage. The chapter leaders are Kathy Thaxton, and Jeremy Martinez
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

funds to OWASP earmarked for Boulder.

Next Meeting - Chapter Planning Get-Together - Thurs, April 23rd, 6 PM, Staples

Please join the Boulder OWASP Chapter on Thursday, April 23rd, 2009 at Staples for a chapter planning meeting. As Kathy says "it's your chapter" so let's figure out what our chapter is doing the rest of this year. Feel free to post your ideas on the Colorado 2009 PLANNING PAGE

Planning for 2009 - NOT a presentation - a gathering to define the Chapter's future

Who, what, where, when, why, how to get it done in 2009. Get involved!

Directions to Staples:

http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&sa=X&oi=map&ct=title


Agenda

  • 6:45 to 7pm Chapter Business and nominations for new Chapter Leader
  • 7pm to 8:15pm Presentation

Sponsor: TBD Speaker: You, me, the rest of the folks who show up.

Logistics

No hands-on is planned this time. However, if there WERE "hands on" you'd need to bring a wifi equipped laptop. We recommend the OWASP LiveCD. Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined.


Following the meeting we will have informal discussions over beverages at the Gordon Biersch Brewery and Restaurant.



SnowFROC 5 March 2009 See the planning page for up-to-the minute details

Local News

Chapter Elections 19 Feb (Andy writes:) Andy's gone, Kathy's taking up the slack and kicking butt arranging for IBM to come do hands-on and presentation for Feb. Kathy is planning to have chapter elections BUT you need to submit a nomination/self-nomination to kthaxton AT owasp DOT org saying who you are, what your vision is, how you plan to manage the time it takes, and why you're interested. There is a recent precedent of Security organizations being overtaken by chowderheads and the Boulder Chapter deserves better. (Personal note from Andy - thanks VERY MUCH to all of you who wished me well. I'm doing all right but had to step away from OWASP for the time being. Please help Kathy with the Chapter and with SnowFROC - she is really working hard to keep things going!)

Lab Design Wiki

Info and Wish List for the lab - feel free to edit...

Colorado OWASP Chapter Leaders Asked to Speak at ISACA Meeting David Campbell moderated a panel discussion; Andy was on the panel. Here's what it was about:

Challenges and Successes in Providing Business Benefits: The View from IT Audit, IT Security, and IT Compliance

We will have a panel to discuss the problems, challenges, and successes when working to integrate business needs between the Audit, Security, and Compliance IT functional groups. These groups sometimes seem to work at cross-purposes, and to some business units, these IT groups are at odds with day-to-day business objectives. The panelists will present anecdotes and events to demonstrate challenges and successes in current and previous positions. We will also have an extended Q&A and will be soliciting your input. If you have questions or areas you would like covered, please email the Education VP ahead of time at education AT isaca-denver D0T org

Panelists: Jim Dillon, IT Audit view Doug Staubach, IT Compliance view Andy Lewis, IT Security view David Campbell, Moderator

Jeremy Martinez Joins bOWASP Leadership Jeremy has been at every bOWASP meeting since its inception in Sept 2007 and has volunteered to take on some of the responsibilities for keeping the chapter going. Welcome Jeremy!

PCI DSS 6.6 and 11.3 Clarification Issued

Speaking of web app security...

Clarification WRT PCI requirement 6.6 - WAFs and Code Reviews for PCI compliance.

Clarification WRT PCI requirement 11.3 - pen-testing.

4/14/2008 - Interesting File Download Injection research from Jeff Williams of Aspect Security.

4/1/2008 Yes! There's an April meeting! List-server FUBAR; switching to manual We've been having trouble with our list server. The last thing through was an inadvertent cancellation, so you should have all gotten an individual message to say that there IS a meeting in April!

2/28/2008 - Dariush Rusta has volunteered to be the Project Manager for the Front Range OWASP Conference on June 10th ( THANKS Dariush). More info info to follow later...

How do I learn more about input validation?

Google for Input Validation

Some PHP Security Resources

There seem to be dang few PHP security resources. Please edit this wiki if you've got some good ones. In the mean time, here's some stuff that looks pretty good: PHP meets the Top Ten (c2006)

Fortify's "RAT" is a free tool for static code analysis...


OWASP Tools Available - Jan 2008

Four new OWASP tools are available. OWASP Enterprise Security API helps organizations get organized about application security, OWASP CSRFTester tests for CSRF flaws, OWASP CSRFGuard stops CSRF attacks, and the fantastic new Anti-Samy component allows safe posting of rich content.

What's a Typical Agenda for the Chapter?

6-6:30 - pizza and beverages provided by a sponsor

6:30-6:40 - intro to OWASP and Chapter Business

6:40-7:35'ish - presentation, demonstration, or workshop

7:35'ish - Q & A

after Q & A - adjourn to less formal environment

What should I expect to see at a bOWASP meeting?

Each speaker will be encouraged to cover:

- demonstration of the threat ( "look!  I got EVERYONE'S credit card #!")
- overview/sample of vulnerable code, preferably in PHP, Java, or .Net env.
- some details regarding how to correct the code
- some thoughts as to how to test for the problem and/or "immunize" against it during a typical SDLC
- additional tools and references


Notes From Previous Meetings

2009 meetings

February 2009 - Presentation: Web Application Security: Hacking 101

Few can argue that web applications present a significant threat of attacks for State Government Organizations.

In fact Gartner research indicates that 75% of today’s attacks occur at the application level and 80% of organizations will experience an application security incident by 2010. Cost of the data breach at TJX soars to $256M, Boston Globe—August 2007 Monster says data loss involved 1.3 million names, Reuters—August 2007 Credit Card Information Stolen from State of Indiana’s website, InfoWeek—January 2007

Are you confident this won’t happen to you? This interactive Session is designed to teach attendees first-hand the fundamentals of hacking – how to find web application vulnerabilities through a combination of manual and automated approaches, and what to do when a vulnerability has been identified.

In this session, you will learn about:

   * The importance of web application security – today's most significant online threat
   * The three most common web application attacks – how they occur, and what can be done to prevent them
   * Manual versus automated approaches for scanning and identifying web application vulnerabilities
   * Best practices for fixing vulnerabilities once they have been identified
   * Making web application security part of the entire development lifecycle

Sponsor: IBM Rational Speaker: Martin Stenkilde, IBM Rational Certified Senior IT Specialist Martin, a native Dane, started his professional career in quality assurance while working for Rational Software's European Headquarter in Amsterdam. Martin also spent time working for Zyntax, a Premier IBM Business Partner, where he functioned as the primary Performance and Security Testing Consultant for 5 years. Martin then joined the IBM Rational Specialty team, and is a certified IBM Test Manager, WebSphere Solutions Specialist, ISEB Professional, and holds a master certification from the Open Group.


Jan 2009 - AppSec Capture the Flag First Meeting of 2009 - Thursday, January 22nd, 2009

The Boulder OWASP chapter is pleased to present the CTF from the New York Appsec 2008 conference. The CTF is a series of 30 or so "challenges" which demonstrate commonly found software vulnerabilities.

The purpose of the CTF is twofold. Advanced users can test their AppSec acumen by tackling the challenges on their own. Beginning users can learn AppSec fundamentals as they are guided through the challenges by the friendly chapter leaders and advanced users.

Whilst seemingly technical in nature, the CTF will also be of interest to managers, developers and executives, as it provides a simple way to demonstrate and communicate the serious impact of many AppSec vulnerabilities.


2008 and 2007 Meeting Notes

All 2008 meeting notes

All 2007 Meeting Notes


Chapter Leader Links

2009 Colorado Planning Page

Colorado 2009 PLANNING PAGE

Board Members

Kathy Thaxton (Events Director)

Jeremy Martinez (Board Member)

Who else? YOU?


Pizza Delivery At Corporate Express

1. Pizza Hut (303) 466-2367 6445 W 120th Ave, Broomfield, CO 80020

2. Papa John's 5160 W 120TH AVE Broomfield, CO 80020-3305

Phone: (303)469-6262

Distance: 4.07 miles

menu as of 4/17/2008

3. Richie's Neighborhood Pizzeria (720) 887-3434 DON'T KNOW IF THEY DELIVER but they're in FlatIrons mall.

OWASP Threat Risk Modeling guidelines

Well-written, well-referenced SQL injection article

Cool MS Ace Team Blog

https://www.owasp.org/index.php/About_OWASP

https://www.owasp.org/index.php/How_OWASP_Works

https://www.owasp.org/index.php?title=How_OWASP_Works&diff=22690&oldid=15689 (this is a previous version of the 'How OWASP Works' page which contains some ideas about the future)

https://www.owasp.org/index.php/OWASP_brand_usage_rules

https://www.owasp.org/index.php/Chapter_Rules

https://www.owasp.org/index.php/Chapter_Leader_Handbook

https://www.owasp.org/index.php/Category:Chapter_Resources

http://www.owasp.org/index.php/Tutorial#Editing_OWASP

And finally, if you haven't seen this amazing page created by Sebastien a while back with descirptions and links to past OWASP presentations, you must check it out now: http://www.owasp.org/index.php/OWASP_Education_Presentation

Of particular interest: https://www.owasp.org/images/d/df/OWASP_-_Presentation_for_potential_sponsorships.doc

Click here to post events on the OWASP Community calendar

Recruiting Tips - if you need to hire a WebAppSec or AppSec specialist

1. Join this chapter's mailing list and publish to the chapter.

2. Publish to Security Focus's jobs list.

3. Publish to the Yahoo CISSP-jobs list.

4. Publish to local job boards such as RMIUG-Jobs

5. Show up at a meeting, schmooze, and let it be known during the pizza or chapter business portion that YOU ARE HIRING.

6. Include the term OWASP in your ad to make it easily searchable by likely candidates. Consider verbage like:

  • Ability to write code to reduce OWASP Top 10 bugs
  • Ability to test code for OWASP Top 10 bugs
  • Ability to manage Development Teams to adhere to OWASP guidelines