Difference between revisions of "Rochester"

From OWASP
Jump to: navigation, search
(Welcome to the OWASP Rochester Local Chapter)
(Rochester OWASP Chapter meeting April 15th 5:30pm at Nixon Peabody)
 
(15 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]
 
Welcome to the local Rochester chapter homepage. The acting chapter leader is [mailto:ralph.durkee@owasp.org Ralph Durkee ]
  
== Ethical Hacking as a Professional Penetration Testing Technique ==
+
== Rochester OWASP Chapter meeting ==
  
<b>Date:</b>  April 18, 2013 @ 5:30 PM
+
<b>Date:</b>  April 15th 5:30pm
  
<b>Location:</b> RIT's Golisano Hall Auditorium (Building 70, Room 1400)
+
<b>Location:</b> Nixon Peabody 1300 Clinton Square, 13th floor, Rochester, NY 14604
  
<b>Please RSVP to </b> [mailto:Ralph.Durkee@Owasp.org Ralph Durkee]
+
<b>Cost:</b> The meeting is free, but seating is limited, and advance registration is required.
  
We'll have some brief news and chapter business followed by a presentation by Ralph Durkee. Food will be provided so please register by sending an email. You can park in J or T Lots. Campus maps are on-line http://maps.rit.edu.
+
<b>To Register:</b> Please RSVP by March 31st to Ralph.Durkee @ OWASP.org
  
<b>Abstract:</b> Ralph will briefly discuss Ethical Hacking (EH) and Penetration Testing (PT), why they are important and how they differ. He will talk about the ethical hacking mindset and the ethical hacking process and why it's important as a professional Penetration testing meta-technique. The presentation will then apply the EH process with audience participation on exploiting sample vulnerabilities of both servers and clients. The examples will cover several specific, yet basic tools and techniques that continue to be effective in the exploitations of systems, applications and clients. Of course he'll also briefly discuss how to defend against these attacks. Although the cool tools and sexy exploits tend to get much of the attention when it comes to penetration testing, the focus will be on the ethical hacking as a meta-technique and how it can be applied to maximize the usefulness of the results to the hiring organization. The presentation will also cover some common misconceptions, mistakes, ethical issues and non-professionalisms that continue to trouble the profession.
+
<b>Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities</b>
  
<b>Bio:</b> Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 & SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.
+
We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities.  In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow.  We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.
 +
 
 +
The course will use a virtual Linux system with the required tools running on your own laptop.  Attendees should be comfortable with the Linux command line, and be familiar with basic C/C++ programming.  We'll be using the Gnu development tools such as gcc, gdb, and make. Vim, Emacs and Eclipse will all be installed for your editing and exploit writing pleasure. You must bring your own laptop. The laptop can be MS Windows, Mac or Linux, just make sure you have a recent version of VirtualBox installed and working.  Having a DVD reader is recommended for transferring the VM, but we will also have a single shared USB DVD drive available.
 +
 
 +
<b>Laptop Requirements:</b>
 +
At least 4Gb RAM
 +
 
 +
    20 Gb of free disk space
 +
    Recent version of Virtual Box installed and working.
 +
    Administrator or root privileges for the laptop.
 +
    Comfortable with Linux Command Line and g++ / gcc.
 +
    Some C/C++ Programming is recommended.
 +
 
 +
 
 +
<b>Biography</b>
 +
Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 & SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.
  
 
== Participation ==
 
== Participation ==
Line 33: Line 48:
 
*<b>Secretary:</b> Appointed by Event Coordinator at each meeting.
 
*<b>Secretary:</b> Appointed by Event Coordinator at each meeting.
 
*<b>Event Coordinator:</b> Vacant
 
*<b>Event Coordinator:</b> Vacant
*<b>Communications and Chapter OWASP Evangelist:</b> [mailto:lou.leone@owasp.org Lou Leone]
+
*<b>Communications and Chapter OWASP Evangelist:</b> Vacant
 
*<b>Webmaster:</b> [mailto:duane.peifer@owasp.org Duane Peifer]
 
*<b>Webmaster:</b> [mailto:duane.peifer@owasp.org Duane Peifer]
 
*<b>Mail List Administrator:</b> [mailto:duane.peifer@owasp.org Duane Peifer]
 
*<b>Mail List Administrator:</b> [mailto:duane.peifer@owasp.org Duane Peifer]
Line 48: Line 63:
  
 
== Past Events ==
 
== Past Events ==
 +
;Rochester Security Summit
 +
Date: Oct 7-8, 2014 8am - 4:30pm
 +
Topics:
 +
* Top Ten Web Defenses (Jim Manico)
 +
* Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)
 +
* Docker and Linux Containers for Infosec Professionals (Matt Kaar)
 +
* Building a Software Security Program (Kuai Hinojosa)
 +
Location: Hyatt Regency, Rochester, NY 14604
 +
 +
;June 20 2014 Meeting
 +
Topic: Security Development Lifecycle
 +
Speaker: Larry Kovnat (CISSP, CISM)
 +
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
 +
 +
 +
Speaker: Larry Kovnat (CISSP, CISM)
 +
Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604
 +
 +
 +
;April Meeting 2013
 +
Topic: Ethical Hacking as a Professional Penetration Testing Technique <br/>
 +
Speaker: Ralph Durkee, Durkee Consulting <br/>
 +
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf
 +
 
;May 2012
 
;May 2012
 
Mercury Networks Security Summit
 
Mercury Networks Security Summit

Latest revision as of 19:11, 18 March 2015


Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The acting chapter leader is Ralph Durkee

Rochester OWASP Chapter meeting

Date: April 15th 5:30pm

Location: Nixon Peabody 1300 Clinton Square, 13th floor, Rochester, NY 14604

Cost: The meeting is free, but seating is limited, and advance registration is required.

To Register: Please RSVP by March 31st to Ralph.Durkee @ OWASP.org

Hands-on Ethical Hacking: Preventing and Exploiting Stack Overflow Vulnerabilities

We'll have a hands-on Ethical Hacking training session on preventing and exploiting stack overflow vulnerabilities. In the session we'll discuss how to find a buffer overflow vulnerability and then develop a customized exploit for a stack based buffer overflow. We'll also discuss and test mitigating techniques such as address randomization, stack protections mechanisms, non-executable stacks and of course secure programming to prevent buffer overflows.

The course will use a virtual Linux system with the required tools running on your own laptop. Attendees should be comfortable with the Linux command line, and be familiar with basic C/C++ programming. We'll be using the Gnu development tools such as gcc, gdb, and make. Vim, Emacs and Eclipse will all be installed for your editing and exploit writing pleasure. You must bring your own laptop. The laptop can be MS Windows, Mac or Linux, just make sure you have a recent version of VirtualBox installed and working. Having a DVD reader is recommended for transferring the VM, but we will also have a single shared USB DVD drive available.

Laptop Requirements: At least 4Gb RAM

   20 Gb of free disk space
   Recent version of Virtual Box installed and working.
   Administrator or root privileges for the laptop.
   Comfortable with Linux Command Line and g++ / gcc.
   Some C/C++ Programming is recommended.


Biography Ralph Durkee is the principal security consultant and president of Durkee Consulting, Inc since 1996. Ralph founded the OWASP Rochester, NY chapter and has served on the board since 2004. Ralph served on the ISSA chapter board to start the Rochester ISSA chapter as well as starting the annual Rochester Security Summit. He has served as the ISSA chapter president since 2010. He performs a variety of network and application penetration tests, software security assessments and secure software development consultations for clients. His expertise in penetration testing, incident handling, secure software development and secure Internet and web applications is based on over 30 years of both hands-on and technical training experience. He has developed and taught a wide variety of professional security seminars including custom web application security training, and SANS SEC401 & SEC504 - Hacker Techniques and Incident Handling and CISSP bootcamp courses since 2004. Ralph also regularly consults on the development and implementation of a wide variety of security standards such as web application security, database encryption, Windows, and Linux security. Ralph also has done security consulting for compliance with the Payment Card Industry Data Security Standard, and holds the following certifications CISSP, C|EH, CRISC, GSEC, GCIH, GSNA, GCIA, and GPEN.

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.

The Rochester chapter has two mailing lists: one for announcements and one for general discussion. The announcement list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announcement mailing list can be found here. The discussion mailing list can be found here. You can also review the announcement and discussion e-mail archives to see what folks have been talking about. Please make sure you are subscribed to the announcement list to receive any last minute meeting info.

Local Officers

    • President: Vacant
    • Vice President: Ralph Durkee
    • Treasurer: Ralph Durkee
    • Secretary: Appointed by Event Coordinator at each meeting.
    • Event Coordinator: Vacant
    • Communications and Chapter OWASP Evangelist: Vacant
    • Webmaster: Duane Peifer
    • Mail List Administrator: Duane Peifer

Meeting Dates & Location

Dates: Meetings are announced via the announcmenet mailing list and on the website.


Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.

If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.

Past Events

Rochester Security Summit

Date: Oct 7-8, 2014 8am - 4:30pm Topics:

  • Top Ten Web Defenses (Jim Manico)
  • Ethical Hacking: Preventing and Writing Exploits for Buffer Overflows (Ralph Durkee)
  • Docker and Linux Containers for Infosec Professionals (Matt Kaar)
  • Building a Software Security Program (Kuai Hinojosa)

Location: Hyatt Regency, Rochester, NY 14604

June 20 2014 Meeting

Topic: Security Development Lifecycle Speaker: Larry Kovnat (CISSP, CISM) Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604


Speaker: Larry Kovnat (CISSP, CISM) Location: Nixon Peabody, 1300 Clinton Square, Rochester, NY 14604


April Meeting 2013

Topic: Ethical Hacking as a Professional Penetration Testing Technique
Speaker: Ralph Durkee, Durkee Consulting
https://www.owasp.org/images/f/fc/Ralph_Durkee_Pen_Test_v24L_handout.pdf

May 2012

Mercury Networks Security Summit Tpoic: Mozilla's Content Security Policy Speaker: Lou Leone
https://www.owasp.org/images/9/95/2012_CSP.pptx

May 2011 Meeting

Michael Coates webinar on Attack-Aware Applications.
https://owasp.webex.com/owasp/ldr.php?AT=pb&SP=MC&rID=87764002&rKey=14191b8f8c73dabc

May 5, 2011

MercuryFest Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer Topic: SSL Man-in-the-Middle and Spoofing Attacks

March 2011 Meeting

Topic: Pastebin Scrapping
Speaker: Silas Cutler, Global Crossing, Security Architect

January 2011 Meeting

Topic: State of OWASP and the State of Web Application Security
Speaker: Ralph Durkee, Durkee Consulting

August Meeting 2010

Topic: Man in the Middle Attacks: SSL Spoofing
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting

June Meeting 2010

Topic: Client Side Exploits 101
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS

May Meeting 2010

Topic: New Techniques in Application Intrusion Detection
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.

February Meeting 2010

Ralph Durkee presented a recap of the recent AppSec conference in DC.
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security.


Oct 29-30 2008 - Rochester Security Summit 2008
The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month. This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.

Visit Rochester Security Summit Site for details.

Past Presentations

Mercury Networks Security Symposium May 2012 I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone Presentation - PPTX

January Meeting 2011 State of OWASP and the State of Web Application Security by Ralph Durkee PPT PDF

August Meeting 2010 Man in the Middle Attacks: SSL Spoofing by Duane Peifer PPT PDF
August Meeting 2010 Man in the Middle Attacks: SSL Spoofing by Ralph Durkee PPT PDF

May Meeting 2010 New Techniques in Application Intrusion Detection by Al Huizenga PPTX PDF
May Meeting 2010 Identity Federation and Claim-based Security by Andrea Cogliati PDF

February Meeting 2010 DC AppSec Conference Recap by Ralph Durkee PPT

October Hackerfest 2009 Introduction to OWASP Rochester by Ralph Durkee, Lou Leone PPT

September OWASP 2009 Securing Apache Web Servers with Mod Security & CIS Benchmark by Ralph Durkee PPT Open Office

May OWASP 2009 Key Management - One Perspective by Lou Leone PPT

May IEEE 2009 Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati PPT

January 2009 Paranoid Programming Practices, by Lou Leone and Aaron Witt PPT

May 2008 Database Encryption, by Ralf Durkee PPT

January 2008 SQL Injection and Dynamic SQL, by Andrea Cogliati ZIP

September 2007 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee PowerPoint

October 2006 The first of the OWASP top ten: unvalidated input, by Steve Buck. PowerPoint

April 2006 PGP: Encryption for e-mail and web applications, by Ralph Durkee PDF

February 2006 Identity Theft, Phishing and Pharming, by Danny Allan PDF

February 2006 Secure e-mail, by Thomas Bullinger PDF

January 2006 PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran PDF

September 2005 Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee PDF Open Office

April 2005 Avoiding Backend Exploitation of Mail Forms, by Max Kessler PowerPoint Open Office

March 2005 Bringing Two-Factor Authentication to Web Applications, by Michael Starks PowerPoint Open Office

February 2005 Insecure Storage, by Chris Karr PowerPoint

January 2005 Access Control and Session Mgmnt, by Steve Buck PowerPoint Open Office

November 2004 Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo PowerPoint