OWASP Rochester

Rochester_banner.jpg

Welcome to the OWASP Rochester Local Chapter

Welcome to the local Rochester chapter homepage. The chapter leaders are:

If you or your organization is interested in sponsoring a meeting or hosting a meeting please contact one of the local officers listed above.

Connect With Us

     
Follow-us-on-twitter.png meetup-button.png Slack.png
    #chapter-rochester

Join our announcements mailing list

Join our discussion mailing list

Archived events

Visit our archive page for all old event details.

Last Year’s Events

OWASP December 19th Meeting

You are invited to join the Rochester OWASP chapter and the ISSA Rochester chapter for our joint December 19th Meeting at 6pm. Space is limited, so please RSVP by Dec 12th so we can plan accordingly. Dinosaur BBQ will be provided! Come and hear a great presentation, and network with your fellow professionals.

The OWASP chapter is covering its portion of the costs for the event, so if you are a paid OWASP member, Thank you! If not, please consider signing up today.

Our own illustrious Jim Keeler will presenting:

Title: Introduction to Threat Modeling

Abstract: Every business has something to protect. Has yours modeled all of the ways it could be attacked? How will you defend your assets if attacked? How will you account for changes in the threat landscape? We will explore all of these questions and discuss a repeatable process for reducing risk.

Bio: Jim is a senior software engineer at Calero Software. He has been designing and building software since 2005 in many different languages and environments. At Calero, Jim volunteers on an internal security team to promote secure development practices, conduct threat modeling, and support security initiatives. He holds a B.S. in Computer Science from SUNY Fredonia and is pursuing a GSSP-.NET certification.

Where: Nixon Peabody, 1300 Clinton Square, 14th floor [CORRECTED] (free parking underneath the building, bring the ticket to the meeting for validation)

When: Wednesday, Dec 19th, 6:00 PM

Please RSVP by Dec 12th to Ralph Durkee

Thank you, Hope to see you there!

  • ;Rochester Security Summit 2018

Date: Oct 9 & 10, 2018 OWASP AppSec Track:

  • What is the Android Colluded Applications Attack and How to Detect It (Igor Khokhlov & Leon Reznik)
  • Pentesting DevOps: Attacking Containers and Container Orchestration (Mark Manning)
  • Rocking The (Vox)Vote (Jason Ross)
  • Your Apps Have Gone Serverless. Has Your Security? (Tal Melamed)
  • Techniques Criminals Use to Break Authentication and How to Defend Against These Attacks (Danny Harris)
  • The Industrialization of Red and Blue Teaming (Ashley Zaya)
  • OWASP Juice Shop Workshop July 18th, 2018 5:30 pm - 8:00 pm 44 Celebration Drive, Conference Rooms 2007a and 2007b

We’re looking for chapter members who are familiar with basic application security and the OWASP Top 10 who are interested in learning OWASP Juice Shop. The goal is to help plan and facilitate a larger capture-the-flag event at a future meeting. Please bring a Laptop with a WiFi network connection and a modern web browser. You will be installing OWASP Juice Shop on your laptop.

  • What is OWASP Juice Shop?

OWASP Juice Shop is an intentionally insecure web app for security trainings written entirely in JavaScript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. https://www.owasp.org/index.php/OWASP_Juice_Shop_Project

  • What will the workshop cover?

Jim Keeler will lead the workshop. Attendees will learn about the OWASP Juice Shop project, installation and setup, how to exploit common web application vulnerabilities, jeopardy style capture-the-flag (CTF) events, and CTF scoreboards. At the end of the workshop we will be looking for volunteers to help us host a future CTF event! Pizza will be provided. Please RSVP to Ralph Durkee, <Ralph.Durkee@owasp.org> so that we may expect you.

  • Directions

UofRMC_Map.png Park anywhere in the green area. You can enter from Elmwood Ave going eastbound only or from Celebration Drive. Parking is free in the labeled surface lot. Enter the building by the arrow. Take the stairs or elevator to the 2nd floor. Take a right off the elevator and you should be able to easily find room 2007.

  • OWASP Rochester Social Event

Please join the Rochester OWASP chapter for a social event Wednesday, April 25th at MacGregors’ in Henrietta.

Appetizers will be provided.

When: Wednesday, April 25 at 5:30pm

Where: MacGregors’ Grill and Tap Room (300 Jefferson Rd, Rochester, NY)

  • OWASP Rochester Social Event

Please join the Rochester OWASP chapter for a social event Wednesday, December 6th at MacGregors’ in Henrietta.

Appetizers will be provided.

When: Wednesday, December 6 at 5:30pm

Where: MacGregors’ Grill and Tap Room (300 Jefferson Rd, Rochester, NY)

Participation

OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others.

Mailing Lists:

Prior to participating with OWASP please review the Chapter Rules.

Past Presentations

Date

Title

Presenter

Download

2019, May

OWASP Amass Project

Jeff Foley, Anthony Rhodes

16x16-icon-w-pdf.png
16x16-icon-w-pdf.png

2019, April

Ethical Web Hacking

Jim Keeler

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2018, December

Introduction to Threat Modeling

Jim Keeler

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2012, May Mercury Networks Security Symposium

I'll see your cross site scripting and raise you a Content Security Policy

Lou Leone

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2011, January

State of OWASP and the State of Web Application Security by Ralph Durkee

Ralph Durkee

16x16-icon-w-ppt.png 16x16-icon-w-pdf.png

2010, August

Man in the Middle Attacks: SSL Spoofing

Duane Peifer

16x16-icon-w-ppt.png 16x16-icon-w-pdf.png

2010, August

Man in the Middle Attacks: SSL Spoofing

Ralph Durkee

16x16-icon-w-ppt.png 16x16-icon-w-pdf.png

2010, May

New Techniques in Application Intrusion Detection

Al Huizenga

16x16-icon-w-ppt.png 16x16-icon-w-pdf.png

2010, May

Identity Federation and Claim-based Security

Andrea Cogliati

16x16-icon-w-pdf.png
16x16-icon-w-pdf.png

2010, February

DC AppSec Conference Recap

Ralph Durkee

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2009, October October Hackerfest

Introduction to OWASP Rochester

Ralph Durkee, Lou Leone

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2009, September

Securing Apache Web Servers with Mod Security & CIS Benchmark

Ralph Durkee

16x16-icon-w-ppt.png, ODP

2009, May

Key Management - One Perspective

Lou Leone

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2009, May IEEE

Introduction to OWASP

Ralph Durkee, Andrea Cogliati

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2009, January

Paranoid Programming Practices

Lou Leone, Aaron Witt

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2008, May

Database Encryption

Ralph Durkee

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2008, January

SQL Injection and Dynamic SQL

Andrea Cogliati

ZIP

2007, September

2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities

Ralph Durkee

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2006, October

The first of the OWASP top ten: unvalidated input

Steve Buck

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2006, April

PGP: Encryption for e-mail and web applications

Ralph Durkee

16x16-icon-w-pdf.png
16x16-icon-w-pdf.png

2006, February

Identity Theft, Phishing and Pharming

Danny Allan

16x16-icon-w-pdf.png
16x16-icon-w-pdf.png

2006, February

Secure e-mail

Thomas Bullinger

16x16-icon-w-pdf.png
16x16-icon-w-pdf.png

2006, January

PCI Compliance

Pat Massey, Ralph Durkee,

Maureen Baran

16x16-icon-w-pdf.png
16x16-icon-w-pdf.png

2005, September

Two Factor Authentication for Java Applications with Client Certificates

Ralph Durkee

16x16-icon-w-pdf.png, SXI

2005, April

Avoiding Backend Exploitation of Mail Forms

Max Kessler

16x16-icon-w-ppt.png, SXI

2005, March

Bringing Two-Factor Authentication to Web Applications

Michael Starks

16x16-icon-w-ppt.png, SXI

2005, February

Insecure Storage

Chris Karr

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2005, January

Access Control and Session Mgmnt

Steve Buck

16x16-icon-w-ppt.png, SXI

2004, November

Intro to OWASP

Ralph Durkee

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

2004, November

Demonstration of SQL Injection attack and prevention

Paul Cupo

16x16-icon-w-ppt.png
16x16-icon-w-ppt.png

NOTOC

Category:OWASP Chapter Category:United States


Example

Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.