Difference between revisions of "Phoenix"

From OWASP
Jump to: navigation, search
(oct meeting info)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:adam.muntner@quietmove.com Adam Muntner] and [mailto:andreg@gmail.com Andre Gironda]
 
{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:adam.muntner@quietmove.com Adam Muntner] and [mailto:andreg@gmail.com Andre Gironda]
<paypal>Phoenix</paypal>
 
 
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}
 
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}
  
 
== Local News ==
 
== Local News ==
  
2009 Meetings
+
2010 Meetings
  
OWASP Phoenix is kicking off 2009 with a new meeting schedule and a new location!
+
OWASP Phoenix is running our 2010 meetings at the following time and location.
  
 
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour.  
 
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour.  
Line 13: Line 12:
 
Afterwards, we'll head to a local watering hole for socializing and fun.  
 
Afterwards, we'll head to a local watering hole for socializing and fun.  
  
The meetings are now being generously hosted by [http://www.executrain.com/ ExecuTrain] and [http://www.quietmove.com QuietMove], at Executrain's training facility.
+
The meetings are being generously hosted by [http://www.executrain.com/ ExecuTrain] and [http://www.quietmove.com QuietMove], at Executrain's training facility.
  
The new location is:
+
The location is:
 
Executrain
 
Executrain
 
3600 E University Dr # A1400
 
3600 E University Dr # A1400
Line 22: Line 21:
 
The entrance is on the West side of the building. Look for the suite number on the door.
 
The entrance is on the West side of the building. Look for the suite number on the door.
  
== OCTOBER MEETING INFO - TUES OCT 6TH 2009 6:30 PM  ==
+
== FEBRUARY MEETING INFO - TUES FEB 2ND 2010 6:30 PM  ==
  
OWASP Phoenix invites you to it's OCTOBER meeting!
+
OWASP Phoenix invites you to it's FEBRUARY meeting!
  
Tues OCT 6th at 6:30 PM - 7:30 PM with a social/happy hour at a Casey Moore's afterwards.  
+
Tues FEB 2nd at 6:30 PM - 7:30 PM with a social/happy hour at Taste of Top's afterwards.  
 
The meetings are always free, unfortunately the drinks afterward aren't.
 
The meetings are always free, unfortunately the drinks afterward aren't.
  
Line 37: Line 36:
 
Phoenix OWASP Chapter Lead
 
Phoenix OWASP Chapter Lead
  
Presentation:
+
Discussion:
  
Andre Gironda presents: Using ASVS with the Code Review Guide, Testing Guide, and Time Management
+
TBD
  
The OWASP Application Security Verification Standards, which defines four levels of web application security verification, lays down a framework for security architecture review. While the ASVS includes many requirements for controls, it does not suggest which tools, techniques, timeline or methodologies to utilize. The OWASP Code Review and Testing Guides provide the technical practices and suggest or hint at tools, but also lack the timeline and methodology necessary to complete an application penetration-test or SDLC integration project for proper application security hygiene.
+
The location is: Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034
 +
The entrance is on the West side of the building. Look for the suite number on the door.
  
This presentation will provide the 1000 foot view all the way down to the nitty gritty details of how to perform ASVS activities using OWASP resources, as well as some OWASP and non-OWASP tools (freeware or demoware). Example timelines for typical ASVS activities, including reports, will be discussed so that any sort of application security project can be scoped properly, delivered on-time, and within budget.
+
== 2010 Meetings Calendar ==
 +
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.
  
Andre Gironda is an application security specialist with a global security consulting firm providing IT security services to the Fortune 500 and financial institutions as well as U.S. and foreign governments. Prior to his current employment, Andre held a number of payment application security positions in addition to working for the largest online auction website. He is currently a leader for the Open Web Application Security Project (OWASP), where he co-produces the global OWASP News Pod
+
*<b>March 2,</b><i>Meeting potentially cancelled due to timing with the RSA Security Conference in San Francisco</i><br />
  
 +
*<b>April 6,</b><i>"Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors & Data"</i> <b>Mr. Jill Naymie</b>, [http://www.veracode.com Veracode]<br />
  
The location is: Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034
+
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.
The entrance is on the West side of the building. Look for the suite number on the door.
+
 
 +
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.
 +
 
 +
In this session we will cover:
 +
·    Prevalence of backdoors and malicious code in third party attacks
 +
·    Definitions and classifications of backdoors and their impact on your applications
 +
·    Methods to identify, track and remediate these vulnerabilities
 +
 
 +
== .   ==
  
 
== Resources ==
 
== Resources ==
'''New pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''
+
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''
  
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every other month, typically with two speakers at each meeting.   
+
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.   
  
 
== What talks would you like to see? ==
 
== What talks would you like to see? ==

Revision as of 09:06, 2 February 2010

Contents

OWASP Phoenix

Welcome to the Phoenix chapter homepage. The chapter leaders are Adam Muntner and Andre Gironda
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

Local News

2010 Meetings

OWASP Phoenix is running our 2010 meetings at the following time and location.

Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour.

Afterwards, we'll head to a local watering hole for socializing and fun.

The meetings are being generously hosted by ExecuTrain and QuietMove, at Executrain's training facility.

The location is: Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034

The entrance is on the West side of the building. Look for the suite number on the door.

FEBRUARY MEETING INFO - TUES FEB 2ND 2010 6:30 PM

OWASP Phoenix invites you to it's FEBRUARY meeting!

Tues FEB 2nd at 6:30 PM - 7:30 PM with a social/happy hour at Taste of Top's afterwards. The meetings are always free, unfortunately the drinks afterward aren't.

The meetings are now being generously hosted by ExecuTrain and QuietMove, at Executrain's training facility.


This month's meeting:

Introduction, chapter business. web application security news update by Adam Muntner, Managing Partner, QuietMove Inc. and Phoenix OWASP Chapter Lead

Discussion:

TBD

The location is: Executrain 3600 E University Dr # A1400 Phoenix, AZ 85034 The entrance is on the West side of the building. Look for the suite number on the door.

2010 Meetings Calendar

This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.

  • March 2,Meeting potentially cancelled due to timing with the RSA Security Conference in San Francisco
  • April 6,"Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors & Data" Mr. Jill Naymie, Veracode

With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.

Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.

In this session we will cover: · Prevalence of backdoors and malicious code in third party attacks · Definitions and classifications of backdoors and their impact on your applications · Methods to identify, track and remediate these vulnerabilities

.

Resources

Archived pages on Phoenix/Tools and Phoenix/ToolsProfile

This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every month, typically with one or two speakers at each meeting.

What talks would you like to see?

Please Update


  • Certificates
  • Application Firewalls
  • PHP
  • Security ROI
  • Penetration Testing Methods
  • AJAX
  • Cryptography in Web Applications
  • Reversing ActiveX controls
  • Using Local Proxies
  • Browser Safety / Security
  • Web services security: XML/SOAP/WSDL

.

Previous Meetings

Application Security Tools
A Scanner Sparkly - Web Application Proxy Editors and Scanners - Andre Gironda
Gray Box Assessment Lessons Learned - Adam Muntner
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell

Reflections on Trusting the Same-Origin Policy – and other web+network trust issues – Andre Gironda

In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one "origin" from getting or setting properties of a document from a different "origin". It was designed to protect browsers from executing code from external websites, which could be malicious.

XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break?

Data@Risk – Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian

Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.

Web Application 0-Day – Jon Rose

Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. We’ll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.

Discovering Web Application Vulnerabilities with Google CodeSearch

Building Application Security into the SDLC - Adam Muntner

Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to "bake security in" rather than "ice it on."