OWASP Salt Lake City
Welcome to the OWASP Salt Lake City Chapter (aka your local appsec support group). We try to meet monthly and for 2023 we plan to alternate between virtual and in person meetings each month.
- Join us at our upcoming chapter meetings (RSVP for upcoming events through our meetup page)
- Chat with us on Slack
- Follow us on Twitter
February 23rd, 2023
- Zoom virtual meeting
Rest of 2023 Calendar
- March 30 - in person
- April 27 - virtual
- May 25 - in person
- June 29 - virtual
- July 27 - camping
- August 31 - virtual
- September 28 - in person
- October 26 - virtual
January 24th, 2023 - In person at HealthEquity
- HealthEquity hosted an onsite meet-up in Draper.
- We discussed third party scripts and how to secure them:
- Discussed use of SRI for versioned scripts and how a CSP offers partial protection for dynamic scripts that can’t be protected via SRI (primarily by preventing an attacker from including scripts from domains not allowed on the CSP).
- Some script vendors are so big (e.g., Google) that if they were compromised, your company probably wouldn’t be in the news even from the downstream impact, but if your script vendor is smaller and your data is sensitive, you could be the headline.
- Limiting these types of risky scripts to less-used pages or only loading them when the user wants to use the functionality could help limit impact.
- Other potential solutions include scanning the scripts (before as a preventive solution or even after as a detective solution [Seth had a solution along these lines]), using iframes, and/or using a tool like feroot.
The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application security.
Chapters are led by local leaders in accordance with the Chapter Leader Handbook. Financial contributions should only be made online using the authorized online donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP Project, independent research, or related software security topic you would like to present.
Everyone is welcome and encouraged to participate in our Projects, Local Chapters, Events, Online Groups, and Community Slack Channel. We especially encourage diversity in all our initiatives. OWASP is a fantastic place to learn about application security, to network, and even to build your reputation as an expert. We also encourage you to be become a member or consider a donation to support our ongoing work.
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.
See all recent events in MeetUp.
August 25, 2022 - Tokens
- Talked about all the various kinds of tokens in use in web applications; used to primarily be session cookies, but now there are refresh, access, JWT, bearer, self-contained tokens and more.
- Talked about maintaining the controls of immediately logging out users and logging out any other sessions of a particular account when their password is changed. This is trickier in a microservices architecture that relies on self-contained and non-revokable access tokens to be performant. Solutions include managing expectations by telling partners and penetration testers that your access tokens will stay alive up to 5-10 minutes (or whatever you set their expiration to be) even after the session is destroyed. Also talked about setting up a revoked list that would have to be disseminated to all microservices in some way (list should be short if it is only users who click the log out button or other user sessions when a user changes their password and the list can be purged once the tokens expire naturally anyway).
February 22, 2022 - Mobile App Pen testing
- It’s getting harder (to jailbreak and analyze)
- Pentesting iOS without a jailbreak
- Many vulnerabilities are actually with the APIs mobile apps utilize
Thursday, January 12
- Developer Training
- Round Table Discussion
November 22nd and talked about:
- OWASP’s new Top 10 2021
- OWASP Top 10 is almost entirely categories now with SSRF the last Top 10 that sounds like a single vulnerability; most are collections of dozens of CWEs
- XSS is now part of the broad injection category, but in some ways, a lot of these could be linked into even broader categories in the same way; there’s a lot of overlap as illustrated by a venn diagram that was shared, but it was for the 2017 Top 10
- Lots of company’s use OWASP Top 10 for training
- Top 10 can also be used for threat modeling/checklists or as a way to check tool/process coverage (e.g., does tool X find OWASP Top 10 A??)
September 29, 2021
- Career progression in AppSec (from entry level up to technical tracks and management),
- How participating in conferences and events (e.g., CTF) can help entry level candidates,
- Impostor syndrom is common in this industry and we all often have to look things up or refresh our memory or learn something new,
- How technical leaders provide value by “scaling their services” (helping others be more effective).