Difference between revisions of "Vancouver"

From OWASP
Jump to: navigation, search
Line 31: Line 31:
 
*Title : OpenID Security Analysis and Evaluation
 
*Title : OpenID Security Analysis and Evaluation
  
Presentation Abstract:
+
*Presentation Abstract:
 
OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, there are currently more than one billion OpenID-enabled user accounts provided by major service providers such as Google, Yahoo and AOL. In this presentation, I will present OpenID security analysis and the evaluation results on 200 OpenID-enabled websites.  Our preliminary result shows that more than 50% of OpenID-enabled websites are vulnerable to cross-site request forgery attack (CSRF) that allow an attacker to modify the victim's account profile information directly; and  75% of evaluated websites allow an attacker to force the victim to login their websites as the attacker stealthily. With additional practical adversary capabilities (e.g., trick users to use a malicious wireless access point or install a malicious browser extension) that enable an attacker to intercept the authentication response from the identity provider, the attacker can impersonate the victim on 65% of OpenID-enabled websites and re-masquerade the victim on 6% of the websites by simply applying the intercepted authentication responses. To the end, I will demonstrate the attack vectors employed in the evaluation process and discuss our proposed countermeasure for the current OpenID-enabled websites and future OpenID specification.
 
OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, there are currently more than one billion OpenID-enabled user accounts provided by major service providers such as Google, Yahoo and AOL. In this presentation, I will present OpenID security analysis and the evaluation results on 200 OpenID-enabled websites.  Our preliminary result shows that more than 50% of OpenID-enabled websites are vulnerable to cross-site request forgery attack (CSRF) that allow an attacker to modify the victim's account profile information directly; and  75% of evaluated websites allow an attacker to force the victim to login their websites as the attacker stealthily. With additional practical adversary capabilities (e.g., trick users to use a malicious wireless access point or install a malicious browser extension) that enable an attacker to intercept the authentication response from the identity provider, the attacker can impersonate the victim on 65% of OpenID-enabled websites and re-masquerade the victim on 6% of the websites by simply applying the intercepted authentication responses. To the end, I will demonstrate the attack vectors employed in the evaluation process and discuss our proposed countermeasure for the current OpenID-enabled websites and future OpenID specification.
  
Line 38: Line 38:
  
 
Please confirm attendance by voting at
 
Please confirm attendance by voting at
[[http://micropoll.com/t/KERPsZBO91]](this is an anonymous poll to get a rough estimate of attendees)
+
[http://micropoll.com/t/KERPsZBO91] (this is an anonymous poll to get a rough estimate of attendees)
  
 
==<font color="red"><font size="5">OWASP Vancouver Chapter Meeting September 23, 2010 (Fourth Meeting of 2010)</font></font>==
 
==<font color="red"><font size="5">OWASP Vancouver Chapter Meeting September 23, 2010 (Fourth Meeting of 2010)</font></font>==

Revision as of 08:21, 14 October 2010

Contents

OWASP Vancouver

Welcome to the Vancouver chapter homepage. The chapter leader is Rui Pereira (ruiper (at) wavefrontcg (dot) com).
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

OWASP Vancouver Chapter Meeting October 21, 2010 (Fifth Meeting of 2010)

Time: Thursday, October 21st, 2010 @ 5:30pm

Location Sierra Systems 1177 West Hastings Street, Suite 2500 Vancouver, BC V6E 2K3

http://maps.google.ca/maps?f=q&source=s_q&hl=en&geocode=&q=1177+West+Hastings+Street,+vancouver,+bc&sll=49.891235,-97.15369&sspn=31.271973,90.263672&ie=UTF8&hq=&hnear=1177+W+Hastings+St,+Vancouver,+Greater+Vancouver+Regional+District,+British+Columbia+V6E+3Y9&z=16

We are pleased to announce the next OWASP Vancouver meeting! This month we have two speakers, Vishal Khandve and San-Tsai Sun.

  • Speaker: Vishal Khandve
  • Topic : An Overview of the Microsoft SDL.
  • Presentation Abstract:

A presentation on individual Microsoft security development practices, which includes: Roles and responsibilities for individuals involved in the application development process. Mandatory security activities. Optional security activities. Application security verification process.

  • Speaker Bio:

Currently working for a multinational bank, Vishal is responsible for metrics and reporting on security development. Vishal has over 6 years of experience in the IT industry, with domains ranging from ERP, CRM, and Human Resourcing, and holds a Masters in Computer Science from the University of Pune.

  • Speaker: San-Tsai Sun
  • Title : OpenID Security Analysis and Evaluation
  • Presentation Abstract:

OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, there are currently more than one billion OpenID-enabled user accounts provided by major service providers such as Google, Yahoo and AOL. In this presentation, I will present OpenID security analysis and the evaluation results on 200 OpenID-enabled websites. Our preliminary result shows that more than 50% of OpenID-enabled websites are vulnerable to cross-site request forgery attack (CSRF) that allow an attacker to modify the victim's account profile information directly; and 75% of evaluated websites allow an attacker to force the victim to login their websites as the attacker stealthily. With additional practical adversary capabilities (e.g., trick users to use a malicious wireless access point or install a malicious browser extension) that enable an attacker to intercept the authentication response from the identity provider, the attacker can impersonate the victim on 65% of OpenID-enabled websites and re-masquerade the victim on 6% of the websites by simply applying the intercepted authentication responses. To the end, I will demonstrate the attack vectors employed in the evaluation process and discuss our proposed countermeasure for the current OpenID-enabled websites and future OpenID specification.

  • Speaker Bio:

San-Tsai Sun is a PhD candidate in the Electrical and Computer Engineering department (ECE) at the University of British Columbia (UBC). He works in the the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) under the supervision of Professor Konstantin Beznosov. His research interests include Web application security, Web 2.0 security and privacy, and distributed access control architecture. His PhD dissertation focuses on improving the security and usability of access control mechanism in Web related systems. Before joining UBC, he was an Information Technology Director at the UCOM Training Center in the Systex Corporation, Taiwan.

Please confirm attendance by voting at [1] (this is an anonymous poll to get a rough estimate of attendees)

OWASP Vancouver Chapter Meeting September 23, 2010 (Fourth Meeting of 2010)

Time: Thursday, September 23rd, 2010 @ 5:30pm

Location Sierra Systems 1177 West Hastings Street, Suite 2500 Vancouver, BC V6E 2K3

http://maps.google.ca/maps?f=q&source=s_q&hl=en&geocode=&q=1177+West+Hastings+Street,+vancouver,+bc&sll=49.891235,-97.15369&sspn=31.271973,90.263672&ie=UTF8&hq=&hnear=1177+W+Hastings+St,+Vancouver,+Greater+Vancouver+Regional+District,+British+Columbia+V6E+3Y9&z=16

We are pleased to announce the next OWASP Vancouver meeting! As previously announced on the mailing list, we will have the meeting on September 23rd, and Sierra Systems is once again hosting our meeting.

  • Speaker:

This month we have Dana Epp from Scorpion Software who will lead the group in performing a threat model of an application using the Microsoft SDL Threat Modeling process and tools! This session is an interactive session that will provide an opportunity for the attendees to participate as well as learn how to use this free and powerful process and tool from Microsoft.

  • Call for Volunteer:

We are looking for a volunteer to offer an application for threat modeling! This is an opportunity to learn how this tool and process can be applied directly to your development cycle and business! If you are interested in volunteering your application for this session, please let me know! (Yvan Boily [[2]])

Please confirm attendance by voting at http://micropoll.com/t/KERPsZBMHr (this is an anonymous poll to get a rough estimate of attendees)

OWASP Vancouver Chapter Meeting July 19, 2010 (Third Meeting of 2010)

Time: Thursday, August 19th, 2010 @ 5:30pm

Location Sierra Systems 1177 West Hastings Street, Suite 2500 Vancouver, BC V6E 2K3

http://maps.google.ca/maps?f=q&source=s_q&hl=en&geocode=&q=1177+West+Hastings+Street,+vancouver,+bc&sll=49.891235,-97.15369&sspn=31.271973,90.263672&ie=UTF8&hq=&hnear=1177+W+Hastings+St,+Vancouver,+Greater+Vancouver+Regional+District,+British+Columbia+V6E+3Y9&z=16

This meeting featured two presentations on PCI compliance and certification from IPS.

  • Speakers:

Santosh Nair (Chief Technology Officer) and Don Bowen (Senior Account Manager), IPS

  • Topic:

Organizations today are faced with a host of regulatory compliance requirements, such as PCI, SOX and NERC. It has become increasingly important for organizations to ensure payment account data security through compliance with the PCI DSS. Don and Santosh will attempt to demystify some of the myths and questions that commonly trouble PCI level 3 and 4 merchants. They will also discuss why the PCI DSS is necessary and provide an auditor’s perspective on what is required to achieve compliance through completing a “Self Assessment Questionnaire”.

OWASP Vancouver Chapter Meeting July 22, 2010 (Second Meeting of 2010)

Time: Thursday, July 22, 2010 @ 5:30pm

Location Sierra Systems 1177 West Hastings Street, Suite 2500 Vancouver, BC V6E 2K3

http://maps.google.ca/maps?f=q&source=s_q&hl=en&geocode=&q=1177+West+Hastings+Street,+vancouver,+bc&sll=49.891235,-97.15369&sspn=31.271973,90.263672&ie=UTF8&hq=&hnear=1177+W+Hastings+St,+Vancouver,+Greater+Vancouver+Regional+District,+British+Columbia+V6E+3Y9&z=16

This meeting was held on July 22nd, and Martin Kyle of Sierra Systems offered to host the meeting.

  • First Topic  : Risk Assessment Methodologies - Erasmus Dong - High level presentation on risk management and risk assessment methodologies with focus on OWASP Threat Risk Modeling.
  • Fifteen minute break
  • Second Topic : Cloud Technologies and Risks - Yvan Boily - Brief overview of cloud technologies, and a discussion of some of the key areas of risk.
  • Discussion of how to grow the chapter, and future areas of interest.

About Erasmus Dong:

A new member of the Vancouver OWASP community, Erasmus has been working in information technology for over a decade in areas of operations, infrastructure, and information security risk in government and financial services.

About Yvan Boily:

Yvan Boily works for a global Financial Institution and was the former chapter lead for the Winnipeg chapter of OWASP. He has worked in various roles in IT Security, primarily focused on Application Security and Security Testing. Working for the last 8 years in IT Security, Yvan has held roles in provincial government, independent contracting, and as a consultant for a dedicated IT security firm.

OWASP Vancouver Chapter Meeting April 22, 2010

  • Topic: Informal Meeting
  • Meeting Date: April 22, 2010
  • Facilitators: Yvan Boily / Rui Pereira
  • Place/Room: Steamworks Pub

Agenda

1. Introductions 2. Objectives (discuss initial objectives as a chapter) 3. Discuss Content of Meetings 4. General Discussion

OWASP Vancouver Chapter Meeting April 27, 2009

Time: Monday April 27, 2009 starting at 5:30 p.m.

Location Deloitte & Touche LLP (downtown office) 2800 - 1055 Dunsmuir Street 4 Bentall Centre Vancouver British Columbia

Vancouver Map/Carte<http://maps.google.ca/maps?f=q&hl=en&geocode=&q=2800+Dunsmuir+Street,+Vancouver+British+Columbia+V7X+1P4>

Agenda:

5:30 to 5:45 PM Introductions 5:45 to 6:15 PM Cross Site Scripting XSS & Cross Site Request Forgery CSRF by Mark Lane 6:15 to 6:30 PM Q&A session

Approximately 10 people attended.

OWASP Vancouver Chapter Meeting January 20, 2009

Time: January 20th, 2009 at 6:00 p.m.

Location Deloitte & Touche LLP (downtown office) 2800 - 1055 Dunsmuir Street 4 Bentall Centre Vancouver British Columbia

Vancouver Map/Carte<http://maps.google.ca/maps?f=q&hl=en&geocode=&q=2800+Dunsmuir+Street,+Vancouver+British+Columbia+V7X+1P4>

Agenda:

6:00 to 6:15 PM Introductions 6:15 to 6:45 PM Presentation "Real Experiences in developing a Secure Development Life Cycle" from Stephen Charles 6:45 to 7:00 PM Q&A session

Approximately 10 people attended.

OWASP Vancouver Chapter meeting January 21, 2008

Time: January 21, 2008 6:30 p.m. to 7:30 p.m.

Location Business Objects 910 Mainland Street Vancouver BC, Canada  V6B 1A9

For the January meeting of the OWASP Vancouver chapter we have a very interesting presentation from Michael Weider, Founder and CTO of IBM Watchfire. Michael will provide insights into the latest trends in application security, what is the threat and what best practices are companies employing to address this growing threat.

The session will be held on January 21st starting at 6:30 p.m.

Please contact Mauro Addari at Mauro to register

OWASP Vancouver Chapter meeting November 29, 2007

Location: Business Objects Main office

Attendance: Rodrigo, Rui, Zenko, Russ, Mauro

The meeting started with an introduction of the OWASP group and its objectives: goals and projects that OWASP is leading. There are various open source projects that the OWASP team has been a part of, namely, the OWASP top ten list of vulnerabilities; CLASP ( a guideline for companies to address security issues in their products ); GOAT ( practice your hacking skills on their machines); Web Scarab; plus other scanning/hacking tools.

We then introduced the OWASP Vancouver chapter: lately the chapter has been a little be dormant and all the presents agreed to provide help to revamp the chapter. The objective of the OWASP Vancouver chapter is to promote web application security and security awareness in the community.

In the fall off 2007 the Vancouver chapter reached into the other Vancouver security and technical groups. Some groups as for example SIG Security and Vantug have been interested to hear more about OWASP and the asked for presentations. More presentation can be done to these groups in the next year. We all agree that reaching into Vancouver groups is an important goal for the OWASP Vancouver chapter.

Another goal of the group is to facilitate some technical discussion and presentation on the security field. Some of the topics of interest are the following:

  • Honeypot;
  • Vulnerabilities;
  • Secure Development LifeCycle;
  • Hands on seminar using various security/pen tools;
  • Wireless security;
  • Http and basic encryption;
  • Forensic;
  • Law and enforcement in security;
  • International security groups like CISSP or SANS.

We've also discussed the possibility to promote OWASP in the community and other groups and to capturing new membership through social sites such as Tazzu.com and meetup.com.

The next meeting is planned for the end of January

OWASP Chapter Meeting May 30th, 2007 5:30pm - 7:00pm

Attendance:

  • Neil (PDB Security)
  • Chris (Sxip Identity)
  • Mauro (Business Objects)

Introductions

Ideas for new members?

  • Chris to lead web page
  • Mauro to contact other local security groups (ISACA, ISSA, CIPS Security Special Interest Group)
  • Neil to arrange speakers
  • Group to invite friends :)

Future Speakers

  • Topics of interest: fuzzing, risk modeling (CLASP), other risk methodologies, cryptography, web services, tools

Other ideas?

  • Goals of the chapter: grow, cross-pollination of ideas in app. sec. space, evangelize app sec!
  • Chatted about compliance standards.
  • Chatted about info sec. vs app. sec. as a whole.