Difference between revisions of "Sydney"

From OWASP
Jump to: navigation, search
(7 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{Chapter Template|chaptername=Sydney|extra=The chapter leaders are [mailto:paul.theriault@stratsec.net Paul Theriault], [mailto:Jp@haplessvictim.com Jean-Paul], [mailto:Chris@HackLabs.com Chris Gatford]
+
{{Chapter Template|chaptername=Sydney|extra=The chapter leaders are [mailto:norman.yue@owasp.org Norman Yue] and [mailto:Paul.Theriault@owasp.org Paul Theriault] .
 +
<br> We are always looking for speakers - email one of the chapter leaders with your idea!
 
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sydney|emailarchives=http://lists.owasp.org/pipermail/owasp-sydney}}  
 
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sydney|emailarchives=http://lists.owasp.org/pipermail/owasp-sydney}}  
  
 
== Next Meeting  ==
 
== Next Meeting  ==
  
TBA - Likely around September 1 - currently organising speakers.  
+
14th of August 2013: OWASP Sydney informal meetup. Assembly Bar, next to Chef's Gallery.<br>
 +
7th of August 2013: Mac reversing get-together. 31 Market Street, next to the QVB (go to the end without the statue of the Queen, align to Darling Harbor and cross the road).
  
 
== Previous Meetings  ==
 
== Previous Meetings  ==

Revision as of 19:59, 1 August 2013

Contents

OWASP Sydney

Welcome to the Sydney chapter homepage. The chapter leaders are Norman Yue and Paul Theriault .
We are always looking for speakers - email one of the chapter leaders with your idea!
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

Next Meeting

14th of August 2013: OWASP Sydney informal meetup. Assembly Bar, next to Chef's Gallery.
7th of August 2013: Mac reversing get-together. 31 Market Street, next to the QVB (go to the end without the statue of the Queen, align to Darling Harbor and cross the road).

Previous Meetings

Date: Wednesday, 28th July 2010

Presentations:

  • Robert Lee, PriceWaterHouse Coopers, Vulnerabilities & Google’s Jarlsberg Application
  • Alex Kouzemchenko, Azimuth Security, WAFs: How I love Thee.

Date: Tuesday, 20rd April 2010

Presentations:

Lightning Talks!

  • Louis Nyffenegger - ‘SQL injection in “order by” clauses’
  • Raphael Speyer – ECMAscript 5
  • Christian Heinrich - OWASP Top Ten 2010
  • Daniel Grzelak – Recon Tool Demonstration

Date: Tuesday, 23rd March 2010

Presentations:

  • PDF Hacking - Paul Theriault (Link TBA)
    The plan is to run an informal workshop style presentation with the following objectives:
    1. Provide an introduction to PDF format, scripting capabilities and other “features” you wouldn’t expect to see in a document format
    2. Learn some basic tools & techniques for analyzing malicious PDF files, for great justice
    3. Learn some basic tools & techniques for creating malicious PDF files, for great science
    4. Look at the security implications of PDFs and what can be done in an enterprise environment to reduce these risks (uninstall Reader?)
  • Incident Case Study - Charles Carmakal (Link TBA)
    Review of the security breach landscape in the US and go through an interesting case study. It involved organised criminals from eastern Europe, over $100M of losses, and incredible sophistication. The initial point of entry for this breach was the web - SQL injection, linked databases, privilege escalation, development/deployment of custom malware.