Difference between revisions of "Mumbai"

From OWASP
Jump to: navigation, search
(Upcoming OWASP Mumbai Chapter Meeting)
m
 
(21 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@mastek.com Dharmesh M Mehta] (91-98670-75327) of  Mastek Ltd.
+
{{Chapter Template|chaptername=Mumbai|extra=The chapter leader is [mailto:dharmeshmm@owasp.org Dharmesh M Mehta]  
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}
+
Join us at our [http://lists.owasp.org/mailman/listinfo/owasp-mumbai mailing list] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-mumbai|emailarchives=http://lists.owasp.org/pipermail/owasp-mumbai}}  
  
<u>The Chapter Mailing Address is:</u><br>
+
<paypal>Mumbai</paypal>  
Dharmesh Mehta<br>
+
Mastek Ltd, Unit 183, SDF 6,<br>
+
SEEPZ, Andheri (E), Mumbai 400 096.<br>
+
91-98670-75327<br>
+
  
== Upcoming OWASP Mumbai Chapter Meeting ==
+
<u></u><br>
  
  '''Date: 22nd September, 2008 - Monday
+
<br>
  
  '''Timing: 2:30 PM to 5:30 PM '''
+
== e-Crime India Conference  ==
  
<u>Registrations OPEN !!</u>
+
[[Image:Ecrime-593x200-1.jpg|center|link=http://www.e-crimecongress.org/india/]]
  
OWASP Chapter Meetings are FREE to attend.  
+
e-Crime India is the premier networking and knowledge initiative for those with responsibility for designing and coordinating security strategy, safeguarding digital assets, protecting customers, responding to incidents, and managing operations or investigations. Bringing together representatives of functions that include information security, IT, fraud, risk, investigations, CERT, audit, forensics, and compliance professionals the forum delivers critical information on protecting IT systems and electronic assets against existing attacks and emerging threats.  
Kindly drop a mail to dharmeshmm at owasp dot org with following details to register for the event.
+
Your Name:
+
Your Organization/Institution:
+
Your Designation:
+
Your Contact No.:
+
  
'''Venue: HOTEL HEAVENS INDIA '''
+
Weblink: http://www.e-crimecongress.org/india/  
Plot No A-1, Opposite SDF 4, SEEPZ, SEZ, ANDHERI (E)- MUMBAI - 400 096.
+
[http://bp1.blogger.com/_ndrxWV2ZI0s/RtJ7Ig7vAbI/AAAAAAAAAto/V5JNTkiJeRY/s1600-h/Venue+Map.jpg Venue Map]
+
 
+
'''Venue Entrance - GATE PASSES '''
+
*NOTE: The venue is inside SEZ (Special Economic Zone). Entry to SEZ is very restricted. The visitor can only enter via a company
+
gate pass. The gate pass for the event will be provided on behalf of MASTEK LTD as organization. The gate passes will have to be
+
collected from the SEEPZ SEZ Main Gate (Gate #1).
+
 
+
'''Any vehicle (Two wheeler or Four wheeler), Cameras, Video Recorders, Laptops / CD’s / DVD’s or any other form of Digital Media
+
is NOT ALLOWED inside SEZ (venue).'''
+
We are sorry for the inconvenience, but SEZ rules need to be strictly adhered to. The person distributing the gate passes will be
+
Mr. Anil Raut and can be contacted at 9819355155.
+
 
+
<u>Speakers for the Meeting</u>
+
 
+
  '''Topic: Testing Large Volume of Apps - Notes from the Field'''
+
  Speaker : Madhumita Iyer, Associate Security Consultant, Paladion Networks Private Ltd. Expert in Application Security Testing,
+
  Network Penetration Testing and Vulnerability Assessments. She has been a project leader for large scale enterprise application
+
  pen tests and has experience in Thick client, Web based and Mobile Application penetration tests.
+
 
+
  '''Topic: Wireless Security'''
+
  Speaker : Sheetal Joseph, Security Consultant, TechMahindra. She is a subject matter expert for internal line of business clients
+
  and external suppliers for security mitigation and maintenance of their internal control environment over data center operations,
+
  system development, change management, incident management and contingency planning. She is Prince2 Registered Practitioner,
+
  CISSP, CEH, BS7799 Lead Auditor and holds many more certifications.
+
 
+
  Call for Other Presentation Slots OPEN !!
+
 
+
<u>Call for Presentations: OWASP Mumbai September 2008 Meet</u>
+
+
OWASP Mumbai Chapter calls for papers for presentation for its upcoming meet in September 2008. 
+
If you are interested in speaking at the event, sharing your thoughts, send in your topic brief (100 words) and your brief profile.
+
+
<u>Interested in Sponsoring??</u>
+
 
+
Send a mail to dharmeshmm at owasp dot org to understand the sponsorship details.
+
 
+
== Summary of OWASP Mumbai Chapter Meetings Held To-Date ==
+
 
+
'''Topics presented till date:'''
+
 
+
1. Secure coding fundamentals - '''Richard Lewis''', Tech Mahindra
+
 
+
2. Threat Analysis and Modeling - '''Dharmesh Mehta''', Mastek
+
 
+
3. 5 ways to lose your user's password - '''Shalini Gupta''', '''Runa Dwibedi''' - Paladion Networks
+
 
+
4. Significance of Random Numbers in Application Security - '''Richard Lewis''', Tech Mahindra
+
 
+
5. Defeating Java Decompilation - '''Girish Kulkarni''', Tech Mahindra
+
 
+
6. /GS Security Check in Visual Studio - '''Chanda Dutta''' et al, Tech Mahindra
+
 
+
7. Black Vector of Web Exploitation - '''Aditya Sood''', Sec Niche
+
[[https://www.owasp.org/images/4/48/Owasp_Live0_Conf_Talk_Aditya_K_Sood_Sec_Niche.pdf Download Presentation]]
+
 
+
8. End User Privacy Breaches : '''Rishi Narang''', ThirdBrigade
+
[[https://www.owasp.org/images/4/4c/OWASP_Day_Rishi_Narang.pdf Download Presentation]]
+
 
+
9. Privacy on the Web - The road ahead in the 21st century : '''Yogesh Badwe''', Orange Business Services
+
[[https://www.owasp.org/images/f/fe/Privacy_0n_the_Web_-_The_Road_Ahead_in_the_21st_Century.pdf Download Presentation]]
+
 
+
[http://owasp.mumbai.googlepages.com/ Download Rest Presentations here >>]
+
 
+
== Roster of OWASP Speakers with Profiles ==
+
 
+
1. '''Anuradha Srinivasan''', Technical Analyst with Mastek, is working with the Application Security Assurance Team for the last 1.5 year. She has 2.5 years of experience in Java development. She is currently involved in conducting Security Assessments and trainings for projects across Mastek.
+
 
+
2. '''Richard Lewis''', Senior Security Consultant with Tech Mahindra, has 8 years of information security experience. Before joining Tech Mahindra, he worked for Tata Consultancy Services (TCS). Richard works in the e-security group of Tech Mahindra and is building a security fabric for secure software development. Richard has a programming background in C, C++, device drivers and MFC. Richard has led the development of two nation-level PKI deployments (India, UK). He has also led the development of a desktop encryptor, authentication SDK and cryptographic SDK. Richard is married, lives with his wife and daughter in busy Mumbai and loves to read the Bible and engage in church outreach work. Richard maintains a blog on application security at [http://SecureApps.Blogspot.com http://SecureApps.Blogspot.com]
+
 
+
3. '''Dharmesh M Mehta''', Technical Analyst with Mastek, has been with the Application Security Assurance Team for more than 3 years. He is involved in conducting security assessments, threat modeling and conducting security workshops for the developer community. He is also a Certified | Ethical Hacker. Dharmesh is the Chapter Leader for OWASP, Mumbai Chapter. You can read Dharmesh's Blog on Smart Security at [http://SmartSecurity.Blogspot.com http://smartsecurity.blogspot.com]
+
 
+
4. '''Shalini Gupta''', Associate Security Consultant at Paladion. She completed her MPIT (Network Specialization) from SCIT in 2005. With Paladion she has an experience of more than 1.5 years in the application security field. Among her other contributions in the area of Application Security is a 2-part series on SSL that Shalini wrote for Palisade, the application security journal for developers.
+
 
+
5. '''Runa Dwibedi''', Associate Consultant at Paladion. She is a certified BS7799 Lead Auditor. She completed her MCA from Bangalore University and also holds an MBA degree from SCDL, Pune. She has an experience of 1.5 years in development of security tools and an experience of 1 year in application security field. She is also actively involved in writing and publishing articles for Palisade.
+
 
+
6. '''Girish Kulkarni''' has 2.5 years of information security experience. Before joining Tech Mahindra, he was employed with Tata Consultancy Services (TCS). Girish currently works in the Enterprise DRM group as Technical Associate and is part of DRM product development team. Girish has a programming background in JAVA and is also proficient in JAVA swing. He has been involved in a very large PKI deployment for the Indian government.
+
 
+
7. '''Chanda Dutta, Divya Makhija, Sugita Kumari, Upma Sharma''' – Trainees pursuing PGDM-Software Development and Management from Symbiosis Centre for Information Technology. Upma is pursuing PGDM-Systems from the same institute. They work in the Secure Software Engineering practice at Tech Mahindra.
+
 
+
8. '''Aditya Sood''' – Independent Security Researcher. He is the founder of SecNiche (www.secniche.org). He has been an active speaker at CERT-IN and XFocus - XCon (China).
+
 
+
9. '''Rishi Narang''' – Vulnerability Research Analyst, Third Brigade. Before joining Third Brigade, he was employed with iPolicy Networks in Security Research Team responsible for IDS/IPS Signatures’ Development for NIPS. Hee has also worked with XIUS Telecom as Server Administrator for Linux and HP Unix Clusters. Currently, he works in the IDS/IPS Filter Development Team and is involved with Vulnerability Research, Zero day attacks & exploits most of the time.
+
 
+
10. '''Yogesh M Badwe''' – Senior Security Engineer, Orange Business Services. Yogesh works in the Web Application Vulnerability Assessment Domain for BFSI clients. Apart from being CCNP and ITIL Certified he also holds the cVa [Certified Vulnerability Assessor-DNV] certification. His previous experience was in the domain of Security Management & implementation of Security Event Management Products on Enterprise Networks. He carries out active research in the field of Security Event-Correlation and Next Generation Attack-Pattern Detection and has published a research paper at an international conference on computer security and forensics relating to privacy issues.
+
 
+
 
+
'''Minutes of Meeting - Monday July 31st 2006 [03:00 PM - 5:00 PM] '''
+
 
+
The second OWASP Mumbai Chapter Meet was held at TechMahindra premises in Chandivali. Mr. Richard on behalf of TechMahindra gave a warm welcome to all the delegates to the OWASP Mumbai Local Chapter –II. Accompanying him, Mr. Dharmesh of Mastek Ltd – Mumbai Chapter Head gave a brief description about the goals of OWASP Mumbai Chapter and the road ahead.
+
 
+
Presentations:
+
 
+
1. ''Significance of Random Numbers in Application Security'': '''Richard Lewis''', e-Security Consultant with Tech Mahindra, started with the practical usage of random numbers. He explained how good random number generation prevents applications from malfunctioning, increases strength of cryptographic operations which in turn increases entropy associated with the key. He went on to explain how random numbers automate otherwise manual tasks and how it increases the security of application. He explained the concepts of entropy and to which level it should be reached in an application. In the end he talked about the various sources of random numbers. He showed developers the simple mathematics required to calculate minimum password lengths, given the security requirements.
+
 
+
[http://www.owasp.org/images/1/13/RichardLewis_RandomNumberSignificance.ppt Download Presentation]
+
 
+
2. ''Java Decompilation'': '''Girish Kulkarni''', e-Security Consultant with Tech Mahindra went through Java Decompilation utility and techniques to defeat decompilation. Use of obfuscators, byte code encryptor/decryptor and generating executable from source were some of the techniques that he explained.
+
 
+
[http://www.owasp.org/images/3/3e/Girish_LockingDownJavaByteCode.ppt Download Presentation]
+
 
+
3. ''/GS Security Check in Visual Studio'': '''Chanda Dutta''', '''Divya Makhija''', '''Sugita Kumari''', '''Upma Sharma''' from Tech Mahindra, presented the usage of /GS security check in Visual Studio. Chanda started the presentation by giving an introduction to /GS Security Check feature of Visual Studio. She explained what is /GS Buffer Security Check, the need of /GS and what it can prevent. Sugita further explained how /GS works and what is canary with process of how to using a canary can prevent buffer overrun. Upma then demonstrated a simulation explaining normal working of buffer overflow and how can it be prevented. Divya explained the various limitations of /GS as how the features of /GS can be exploited and summarized the /GS Buffer Security Check features and functionalities.
+
 
+
[http://www.owasp.org/images/a/ad/GS_Switch_in_Visual_Studio.ppt Download Presentation]
+
 
+
'''Venue and Sponsor Details:'''
+
 
+
[http://www.techmahindra.com Tech Mahindra Ltd.].
+
 
+
Tech Mahindra Limited.
+
Wing 1, Oberoi Estate Gardens,
+
Chandivali, Andheri (E),
+
Mumbai 400 072, Maharashtra, India.
+
 
+
 
+
'''Minutes of Meeting - First Meeting - Saturday June 24th 2006 [09:30 - 12:00] '''
+
 
+
With the welcome address by Anuradha, the first meeting of Mumbai Chapter embarked. Right from giving a brief introduction about OWASP and its aim, Anuradha explained the focus of OWASP as a voluntary organization aiming at contributing to the knowledge as a part of sharing it. Apart from it, Anuradha briefed about OWASP Top 10 Project and OWASP Guide to building Secure Application.
+
 
+
Richard presented on Secure Coding Fundamentals and elucidated the Cost factor inculcated due to insecure code resulting in Network Cost, Productivity Cost and so on. Further explaining the basic reasons of threat to code, he explained how the mistakes done by the Programmers, I/O, API Abuse, Environment & Configuration and Time & State were responsible for Security flaws in an application. Moving ahead, Richard laid down a few principles to be followed as Secure Coding – General Guidelines for all the languages and specific Secure Coding Guidelines for C & C++, Java and .NET
+
 
+
Richard's Presentation
+
[http://www.owasp.org/images/2/28/RichardLewis_SecureCodingFundamentals.ppt Download]
+
 
+
With Threat Analysis & Modeling Process, Dharmesh explained the steps followed as Threat Modeling Process starting from Defining Application Requirement, Application Architecture, and Modeling Threats looking at CIA feature of Security Basics. The aim covered to look towards gathering the information needed from application development teams in order to mock out the potential threats that are inherit in the software application they build starting from the very inception of the software birth.
+
Giving the demonstration of Threat Analysis and Modeling Tool v2.0 with the basic example of its functionality, Dharmesh presented the Threat Modeling in real scenario.
+
 
+
Dharmesh's Presentation
+
[http://www.owasp.org/images/6/6c/Dharmesh_Threat_Modeling.ppt Download]
+
 
+
Shalini and Runa explained how password can be lost or manipulated in a real life scenario and it dealt with the countermeasures to be taken to avoid it. The topics covered under it included Stealing Password using different methods as – Browser’s Refresh, Browser’s Memory, Remember feature, Forget Password feature and last but not the least SQL Injection. The role of Browser’s Viewing Tool available showed a clear picture of how password could be easily cracked.
+
 
+
Shalini and Runa's Presentation
+
[http://www.owasp.org/images/2/21/5_ways_to_lose_your_user%27s_password.ppt Download]
+
 
+
'''CPE Credits for CISSP's '''
+
ISC2 has approved 1 CPE for each hour of an OWASP local chapter meeting.
+
 
+
Chapter leader will have a sign up sheet with at least First Name, Last Name, and the date of the OWASP Meeting. After the meeting, the single sheet will be signed once by a chapter lead as proof of attendance, scanned into a .PDF, and emailed out to the chapter members with the meeting minutes so they have a copy for records and can claim CPE credits.
+
----
+
  
 
[[Category:India]]
 
[[Category:India]]

Latest revision as of 04:23, 10 February 2012

Contents

OWASP Mumbai

Welcome to the Mumbai chapter homepage. The chapter leader is Dharmesh M Mehta Join us at our mailing list
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

funds to OWASP earmarked for Mumbai.



e-Crime India Conference

Ecrime-593x200-1.jpg

e-Crime India is the premier networking and knowledge initiative for those with responsibility for designing and coordinating security strategy, safeguarding digital assets, protecting customers, responding to incidents, and managing operations or investigations. Bringing together representatives of functions that include information security, IT, fraud, risk, investigations, CERT, audit, forensics, and compliance professionals the forum delivers critical information on protecting IT systems and electronic assets against existing attacks and emerging threats.

Weblink: http://www.e-crimecongress.org/india/