Podcast 8

From OWASP
Revision as of 15:17, 8 February 2009 by Dre (Talk | contribs)

Jump to: navigation, search

OWASP Podcast Series #8

OWASP NEWS
Recording TBD

overview-icon-itunes20081106.jpg Feed-icon-32x32.png

OWASP AppSec News

http://www.suspekt.org/2009/02/06/some-facts-about-the-phplist-vulnerability-and-the-phpbbcom-hack/
http://hackedphpbb.blogspot.com/2009/01/place-holder.html
http://www.owasp.org/index.php/Category:OWASP_Scrubbr
http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project
http://michael-coates.blogspot.com/2009/02/xss-prevention.html
http://nickcoblentz.blogspot.com/2009/01/owasps-xss-prevention-cheat-sheet.html
While many of you may be familiar with the ha.ckers.org RSnake XSS Cheat Sheet, Michael Coates and Nick Coblentz talk about the advantages of the OWASP XSS Prevention Cheat Sheet. Michael says it's "cool" because it addresses: Injecting Up vs Injecting Down, Attribute Escaping, Javascripting Escaping, CSS Escaping, and URL Escaping
http://blogs.msdn.com/sdl/archive/2009/01/27/sdl-and-the-cwe-sans-top-25.aspx
Bryan Sullivan and Michael Howard put together some information about the Top 25 Most Dangerious programming errors on the SDL blog, including a mapping of the Microsoft SDL to each Common Weakness, or CWE, and how to best address each weakness through education, threat-modeling, a specific Microsoft tool, and/or manual review
http://denimgroup.typepad.com/denim_group/2009/01/owasp-san-antonio-slide-deck-online.html
Dan Cornell of the Denim Group recently spoke at the San Antonio OWASP on "Vulnerability Management in an Application Security World". In this presentation, Dan's agenda focuses in on what to do after you've found vulnerabilities in an application, as well as the different perspectives from a classic IT security group versus the one-track, bug-track mind of developers.
http://keepitlocked.net/archive/2009/01/27/socalcodecamp-presentation-quot-top-ten-tips-for-tenacious-defense-for-asp-net-application-quot.aspx
Another presentation came across the blog world from Alex Smolen @ Foundstone. He spoke at SoCal Code Camp on the "Top Ten Tips for Tenacious Defense in ASP.NET". I know that a lot of people ask, "What are the specific protections that OWASP recommends, and which are out of beta or stable enough to use?" Alex seems to have a prescription.
http://www.cgisecurity.com/2009/01/web-application-scanners-comparison.html
cgisecurity.com brings us a news piece on a recent web application security scanner comparison. Someone named "anantasec" posted a 26-page evaluation of three commercial WASS tools. He tested 13 web applications, 3 demo applications provided by the vendors, and some tests to verify Javascript execution capabilities.
http://shreeraj.blogspot.com/2009/01/infosecworld-08-presenting-research.html
Shreeraj Shah posted on his blog about an upcoming event that may be worth checking out. He is speaking at Infosecworld on "Defending Against the Worst Web-Based Application Vulnerabilities in 2009", which is being held in Florida on Wednesday, March 11th. His "next generation" attack research includes topics such as SQL over JSON, XSS with RSS feeds, and XPATH over SOAP
http://www.cigital.com/justiceleague/2009/01/22/let-the-posturing-begin/
jOHN Steven of Cigital posts on the Justice League blog about hybrid analysis tools. jOHN approaches hybrid analysis from the stance that A) there are strengths to each tool and each type of analysis, and B) While unpopular today, it is valuable to drive dynamic testing efforts from static analysis results
http://jobsearchtech.about.com/od/educationfortechcareers/g/CSSLP.htm
More information has become available about the CSSLP, or The Certified Secure Software Lifecycle Professional certification from (ISC)2. While highly talked about during and after the OWASP AppSec USA 08 conference, the CSSLP is set to debut in June, 2009, when the first exams will become available. The certification appears to focus on 7 key areas or "domains": Secure Software Concepts, Requirements, Design, Implementation, Testing, Acceptance, and Deployment.
http://ounceopen.squarespace.com
http://research.zscaler.com