SlideShare a Scribd company logo
OWASP: An Introduction By Marco Morana January 29 th ,  2008 [email_address]
Agenda What is OWASP OWASP Publications OWASP Tools Demo By Blaine Wilson OWASP Cincinnati Local Chapter Final Questions
What is OWASP? Open Web Application Security Project Promotes secure software development Support application security risk decision making Focused on the security of web applications as software products of the SDLC Provides free resources  to developer teams Encourages active participation and information sharing
What is OWASP? Open Web Application Security Project Non-profit, volunteer driven organization All members are volunteers Some projects are supported by sponsors Provide free resources to the community Publications, Articles, Standards Testing and Training Software  Local Chapters & Mailing Lists Supported through sponsorships Corporate support through financial or project sponsorship Personal sponsorships from members
What is OWASP? What do they provide? Publications OWASP Top 10 OWASP Guides to Building/Testing Secure Web Applications Release Quality Tools/Documentation WebGoat WebScarab Beta and Alpha Quality Tools/Documentation Beta Tools (16) ,Alpha Tools(10) http:// www.owasp.org/index.php/Category:OWASP_Project Local Chapters Community Orientation
OWASP Publications Release Publications Top 10 Web Application Security Vulnerabilities Guide to Building Secure Web Applications Legal Project Testing Guide AppSec Faq
OWASP Publications Common Features All OWASP publications are available free for download from  http://www.owasp.org Publications are released under GNU “Lesser” GNU Public License agreement, or the GNU Free Documentation License (GFDL) Living Documents Updating as needed Ongoing Projects OWASP Publications feature collaborative work in a competitive field
OWASP Publications – OWASP Top 10 Top 10 Web Application Security Vulnerabilities A list of the 10 most severe security issues Updated on a yearly basis Address issues with applications on the perimeter Growing industry acceptance Federal Trade Commission (US Gov) US Defense Information Systems Agency VISA (Cardholder Information Security Program) A good starting point for developing web application security standards for organizations List of Adopters https:// www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
OWASP Publications - OWASP Top 10 Current (2007)Top Ten Issues A1. Cross Site Scripting A2. Injection Flaws A3. Malicious File Execution A4. Insecure Direct Object Reference A5. Cross Site Request Forgery A6. Information Leakage and Improper Error Handling A7. Broken Authentication and Session Management A8. Insecure Cryptographic Storage A9. Insecure Communications A10. Failure to Restrict URL Access https://www.owasp.org/index.php/Top_10_2007
OWASP Publications - OWASP Top 10 Addressing the Top Ten In Presentation (Future Meetings) February 26 – OWASP Top Ten will be discussed March 25 – OWASP Testing Guide will be discussed On the Mailing List The mailing list is a public forum, and as such is suitable for asking questions in general Specific application issues should be discussed in private, especially with regards to business projects Focus Groups If there is sufficient interest, focus groups can be created to discuss specific issues from the perspective of secure design/threat modeling, secure coding, source code analysis, security tests
OWASP Publications - OWASP Guide Guide to Building Secure Web Applications Provides a baseline for developing secure software Introduction to security in general Introduction to application level security Discusses key implementation areas Architecture Authentication Session Management Access Controls and Authorization Event Logging Data Validation
OWASP Publications - OWASP Guide Future Topics regarding the Guide In Presentation (Future Meetings) Following the Top Ten presentations specific issues will be addressed in monthly meetings On the Mailing List The focus of the OWASP group is to address all questions pertaining to application security, of any level of technical ability Focus Groups If there is sufficient interest, focus groups can be created to discuss specific issues
OWASP Publications – OWASP Legal Legal Project Project focused on contracting for secure software  Secure Software Contract Annex Targeted towards consultants Addresses secure software concerns between customers and  vendors Secure software contracting hypothetical case study Company outsourced web application development to a software shop Company sue the developers on breach of contract for negligence This project does NOT provide legal advice, but rather guidelines from which legal documents can be drafted
OWASP Publications – Testing Project Security Testing Guide A framework for testing web applications Testing Best Practices (when to test, what to test and how) Testing Methodologies (manual reviews, threat modeling, code reviews, penetration testing) Testing Tools (black box, white box static parsers, dynamic analyzers, acceptance test tools) Test Cases For Common Web Application Vulnerabilities  Criteria for Evaluating The Risk Severity For The Vulnerabilities  Reporting Getting the Guide http:// www.owasp.org/index.php/OWASP_Testing_Project
OWASP Tools Demo By Blaine Wilson Webscarab web proxy Webgoat Training web site
OWASP Software - WebScarab WebScarab A framework for analyzing HTTP/HTTPS traffic Written in Java Multiple Uses Developer: Debug exchanges between client and server Security Analyst: Analyze traffic to identify vulnerabilities Technical Tool Focused on software developers Extensible plug-in architecture Open source; easy to extend core system Very powerful tool Getting the Tool http://www.owasp.org/software/webscarab.html
OWASP Software - WebScarab Web Application Client server application using HTTP as the transport. Delegation of tasks between the client and the server
OWASP Software - WebScarab Proxy Server Resides between the client and the server Services requests on behave of the client Benefits include; Caching, Content filtering, Reformatting for special browsers (cell phones), Track usage
OWASP Software - WebScarab DEMO
OWASP Software - WebGoat WebGoat Primarily a training application Provides An educational tool for learning about application security A baseline to test security tools against (i.e. known issues) What is it? A J2EE web application arranged in “Security Lessons” Based on Tomcat and JDK 1.5 Oriented to learning Easy to use Illustrates credible scenarios Teaches realistic attacks, and viable solutions
OWASP Software - WebGoat WebGoat – What can you learn? A number of constantly growing attacks and solutions Cross Site Scripting SQL Injection Attacks Thread Safety Field & Parameter Manipulation Session Hijacking and Management Weak Authentication Mechanisms Many more attacks added Getting the Tools http://www.owasp.org/software/webgoat.html Simply download, unzip, and execute
OWASP Software – WebGoat DEMO Warning Using what you have learned on your company’s web applications will get you fired.
OWASP Cincinnati Local Chapter The main objective it to building a community Local Chapters provide opportunities for OWASP members to share ideas and learn information security, several locations around the world:  http:// www.owasp.org/apps/maps/index.jsp Open to all; any level of proficiency Provide a forum to discuss issues based on local regulation and legislation Provide venue for invited guests to present new ideas and projects To join a chapter, simply sign up on the appropriate mailing list
OWASP Cincinnati Local Chapter Started October 2007 Need to establish a web application security community to serve security professionals Support from Citigroup (location, speakers) What do we have to offer? Monthly Meetings Mailing List Presentations & Groups Open Forums for Discussion Vendor Neutral Environments
OWASP Cincinnati Local Chapter What do we have to offer? Monthly Meetings An opportunity to listen to monthly presentations introducing OWASP (prior to regular meetings) An opportunity to attend special presentations focused on OWASP projects, and focusing on specific areas of interest An opportunity to work with organizers to show additional presentations and develop workshops to address specific issues An open environment for discussion of information security suitable for novices, professionals, and experts Free Coffee!!!!!
OWASP Cincinnati Local Chapter What do we have to offer? Mailing Lists A wide selection of mailing lists are available from the OWASP main page, including specific mailing lists for all topics covered today  https:// lists.owasp.org/mailman/listinfo A local mailing list which can be used to arrange focus groups, monthly meetings, and discuss issues of importance locally  ttps://lists.owasp.org/mailman/listinfo/owasp-cincinnati Rules Keep it professional; most subscribers currently receive messages to business accounts No sales or marketing materials; the list will be restricted to subscribers, however if spam becomes an issue moderation will be enforced
OWASP Cincinnati Local Chapter What do we have to offer? Informative Presentations Every monthly meeting will host a 60 minute presentation on a new topic or area of interest Strong focus on building understanding of technical issues If enough interest is generated, specialized presentations can be scheduled Focus Groups As the organization grows focus groups may form allowing for focused discussion outside of monthly meetings Formalized focused groups can be created to tackle specific issues
OWASP Cincinnati Local Chapter What do we have to offer? Vendor Neutral Environments Learn about security without the sales pitches OWASP does not sells: all revenue generated from either website advertising or donations Vendor Neutral Environments Strict guidelines for chapter presentations and sponsorship All sponsors must be approved by The OWASP Foundation. No product presentations ! Presentations that focus on a problem or set of problems and discuss solution approaches that may refer to or show examples of various products are allowed.  Sponsorship shall be in the form of donations to The OWASP Foundation in the name of the local chapter and to provide food / beverages at meeting events.
OWASP Cincinnati Local Chapter What do we have to offer? Stable location to held meeting at Citigroup  9997 Carver Road  Blue Ash, Ohio Proposed Meeting Schedule Last Tuesday of Each Month Jan 29 Feb 26 Mar 25 TBDs
OWASP Cincinnati Local Chapter What can you offer? Mailing Lists Participate to the mailing lists, meetings, and focus groups are open forums for discussion of any relevant topics Mailing Lists Become a Member http:// www.owasp.org/index.php/Membership Participate in OWASP projects Contribute to existing projects Propose new projects Spearhead new ventures Participate in the Local Chapter Reach out the executive board (email contact information is available on local chapter site) Encourage others to subscribe to the email list (full contact information can be elicited via email)
OWASP Cincinnati Local Chapter Next Meeting Feb 26, 2007 5.30 PM-7 PM Presentation:  2007 OWASP Top Ten, Marco Morana Location: Citigroup Campus Buckeyes Room First Floor 9997 Carver Road  Blue Ash, Ohio
Final Questions Further questions on OWASP organization, local chapter, tools demo Presentation will be online: http://www.owasp.org/index.php/Cincinnati Thank you for attending!

More Related Content

What's hot (20)

PDF
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
PPT
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
PPTX
Web application security
Kapil Sharma
 
PDF
Web Application Penetration Testing
Priyanka Aash
 
PDF
MITRE ATT&CK Framework
n|u - The Open Security Community
 
PPT
Application Security
florinc
 
PPTX
OWASP Top 10 2021 What's New
Michael Furman
 
PDF
Secure Code Review 101
Narudom Roongsiriwong, CISSP
 
PPT
Secure code practices
Hina Rawal
 
PPTX
Secure coding practices
Mohammed Danish Amber
 
PPTX
Introduction to penetration testing
Nezar Alazzabi
 
PDF
OWASP API Security Top 10 - API World
42Crunch
 
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
TzahiArabov
 
PDF
Application Security - Your Success Depends on it
WSO2
 
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPTX
SOC and SIEM.pptx
SandeshUprety4
 
PPTX
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
PPTX
MITRE ATT&CK framework
Bhushan Gurav
 
PPTX
DVWA(Damn Vulnerabilities Web Application)
Soham Kansodaria
 
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Web application security
Kapil Sharma
 
Web Application Penetration Testing
Priyanka Aash
 
MITRE ATT&CK Framework
n|u - The Open Security Community
 
Application Security
florinc
 
OWASP Top 10 2021 What's New
Michael Furman
 
Secure Code Review 101
Narudom Roongsiriwong, CISSP
 
Secure code practices
Hina Rawal
 
Secure coding practices
Mohammed Danish Amber
 
Introduction to penetration testing
Nezar Alazzabi
 
OWASP API Security Top 10 - API World
42Crunch
 
OWASP Top 10 2021 Presentation (Jul 2022)
TzahiArabov
 
Application Security - Your Success Depends on it
WSO2
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
SOC and SIEM.pptx
SandeshUprety4
 
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 
MITRE ATT&CK framework
Bhushan Gurav
 
DVWA(Damn Vulnerabilities Web Application)
Soham Kansodaria
 

Similar to Introduction To OWASP (20)

PPT
香港六合彩<六合彩
dqsmesc
 
PPT
香港六合彩 » SlideShare
bnmbroti
 
PPT
香港六合彩 » SlideShare
nwnftpbv
 
PPT
香港六合彩-六合彩
rakfbe
 
PPT
香港六合彩
gxsdjh
 
PPT
香港六合彩
pibpjsxy
 
PPT
Owasp Serbia overview
Nikola Milosevic
 
PPT
OWASP an Introduction
alessiomarziali
 
PDF
Owasp o
Sagar Nangare
 
PDF
Locust Fear
Alan Lepofsky
 
PDF
Owasp top 10 2013 - rc1
Ajay Ohri
 
PDF
OWASP Bulgaria
Zero Science Lab
 
PPTX
Security of internet
OWASPKerala
 
PDF
What are the top 10 web security risks?
Jacklin Berry
 
PDF
[OWASP-Bulgaria] G. Geshev - Chapter Introductory Lecture
G. Geshev
 
PPTX
Web Application Security Strategy
Network Intelligence India
 
PDF
OWASP Overview of Projects You Can Use Today - DefCamp 2012
DefCamp
 
PDF
529 owasp top 10 2013 - rc1[1]
geeksec80
 
PDF
529 owasp top 10 2013 - rc1[1]
geeksec0306
 
PPT
OWASP - Building Secure Web Applications
alexbe
 
香港六合彩<六合彩
dqsmesc
 
香港六合彩 » SlideShare
bnmbroti
 
香港六合彩 » SlideShare
nwnftpbv
 
香港六合彩-六合彩
rakfbe
 
香港六合彩
gxsdjh
 
香港六合彩
pibpjsxy
 
Owasp Serbia overview
Nikola Milosevic
 
OWASP an Introduction
alessiomarziali
 
Owasp o
Sagar Nangare
 
Locust Fear
Alan Lepofsky
 
Owasp top 10 2013 - rc1
Ajay Ohri
 
OWASP Bulgaria
Zero Science Lab
 
Security of internet
OWASPKerala
 
What are the top 10 web security risks?
Jacklin Berry
 
[OWASP-Bulgaria] G. Geshev - Chapter Introductory Lecture
G. Geshev
 
Web Application Security Strategy
Network Intelligence India
 
OWASP Overview of Projects You Can Use Today - DefCamp 2012
DefCamp
 
529 owasp top 10 2013 - rc1[1]
geeksec80
 
529 owasp top 10 2013 - rc1[1]
geeksec0306
 
OWASP - Building Secure Web Applications
alexbe
 
Ad

More from Marco Morana (20)

PDF
Is talent shortage ws marco morana
Marco Morana
 
PPTX
Isaca conference threat_modeling_marco_morana_short.pdf
Marco Morana
 
PPTX
Owasp atlanta-ciso-guidevs1
Marco Morana
 
PPTX
Owasp e crime-london-2012-final
Marco Morana
 
PDF
Security And Privacy Cagliari 2012
Marco Morana
 
PPT
Presentation sso design_security
Marco Morana
 
PPTX
Owasp security summit_2012_milanovs_final
Marco Morana
 
PPTX
Security Summit Rome 2011
Marco Morana
 
PPTX
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
PDF
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Marco Morana
 
PPT
Security Exploit of Business Logic Flaws, Business Logic Attacks
Marco Morana
 
PPT
Software Security Initiatives
Marco Morana
 
PPT
Business cases for software security
Marco Morana
 
PPT
Security Compliance Web Application Risk Management
Marco Morana
 
PPT
Web Application Security Testing
Marco Morana
 
PPT
Owasp Forum Web Services Security
Marco Morana
 
PPT
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
 
PPT
Software Security Frameworks
Marco Morana
 
PPT
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
PPT
Software Open Source, Proprierio, Interoperabilita'
Marco Morana
 
Is talent shortage ws marco morana
Marco Morana
 
Isaca conference threat_modeling_marco_morana_short.pdf
Marco Morana
 
Owasp atlanta-ciso-guidevs1
Marco Morana
 
Owasp e crime-london-2012-final
Marco Morana
 
Security And Privacy Cagliari 2012
Marco Morana
 
Presentation sso design_security
Marco Morana
 
Owasp security summit_2012_milanovs_final
Marco Morana
 
Security Summit Rome 2011
Marco Morana
 
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Marco Morana
 
Security Exploit of Business Logic Flaws, Business Logic Attacks
Marco Morana
 
Software Security Initiatives
Marco Morana
 
Business cases for software security
Marco Morana
 
Security Compliance Web Application Risk Management
Marco Morana
 
Web Application Security Testing
Marco Morana
 
Owasp Forum Web Services Security
Marco Morana
 
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
 
Software Security Frameworks
Marco Morana
 
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
Software Open Source, Proprierio, Interoperabilita'
Marco Morana
 
Ad

Recently uploaded (20)

PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
PPTX
GRADE-3-PPT-EVE-2025-ENG-Q1-LESSON-1.pptx
EveOdrapngimapNarido
 
PDF
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PPTX
HUMAN RESOURCE MANAGEMENT: RECRUITMENT, SELECTION, PLACEMENT, DEPLOYMENT, TRA...
PRADEEP ABOTHU
 
PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PDF
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
PDF
Geographical Diversity of India 100 Mcq.pdf/ 7th class new ncert /Social/Samy...
Sandeep Swamy
 
PDF
Horarios de distribución de agua en julio
pegazohn1978
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
GRADE-3-PPT-EVE-2025-ENG-Q1-LESSON-1.pptx
EveOdrapngimapNarido
 
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
HUMAN RESOURCE MANAGEMENT: RECRUITMENT, SELECTION, PLACEMENT, DEPLOYMENT, TRA...
PRADEEP ABOTHU
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
Geographical Diversity of India 100 Mcq.pdf/ 7th class new ncert /Social/Samy...
Sandeep Swamy
 
Horarios de distribución de agua en julio
pegazohn1978
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 

Introduction To OWASP

  • 1. OWASP: An Introduction By Marco Morana January 29 th , 2008 [email_address]
  • 2. Agenda What is OWASP OWASP Publications OWASP Tools Demo By Blaine Wilson OWASP Cincinnati Local Chapter Final Questions
  • 3. What is OWASP? Open Web Application Security Project Promotes secure software development Support application security risk decision making Focused on the security of web applications as software products of the SDLC Provides free resources to developer teams Encourages active participation and information sharing
  • 4. What is OWASP? Open Web Application Security Project Non-profit, volunteer driven organization All members are volunteers Some projects are supported by sponsors Provide free resources to the community Publications, Articles, Standards Testing and Training Software Local Chapters & Mailing Lists Supported through sponsorships Corporate support through financial or project sponsorship Personal sponsorships from members
  • 5. What is OWASP? What do they provide? Publications OWASP Top 10 OWASP Guides to Building/Testing Secure Web Applications Release Quality Tools/Documentation WebGoat WebScarab Beta and Alpha Quality Tools/Documentation Beta Tools (16) ,Alpha Tools(10) http:// www.owasp.org/index.php/Category:OWASP_Project Local Chapters Community Orientation
  • 6. OWASP Publications Release Publications Top 10 Web Application Security Vulnerabilities Guide to Building Secure Web Applications Legal Project Testing Guide AppSec Faq
  • 7. OWASP Publications Common Features All OWASP publications are available free for download from http://www.owasp.org Publications are released under GNU “Lesser” GNU Public License agreement, or the GNU Free Documentation License (GFDL) Living Documents Updating as needed Ongoing Projects OWASP Publications feature collaborative work in a competitive field
  • 8. OWASP Publications – OWASP Top 10 Top 10 Web Application Security Vulnerabilities A list of the 10 most severe security issues Updated on a yearly basis Address issues with applications on the perimeter Growing industry acceptance Federal Trade Commission (US Gov) US Defense Information Systems Agency VISA (Cardholder Information Security Program) A good starting point for developing web application security standards for organizations List of Adopters https:// www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
  • 9. OWASP Publications - OWASP Top 10 Current (2007)Top Ten Issues A1. Cross Site Scripting A2. Injection Flaws A3. Malicious File Execution A4. Insecure Direct Object Reference A5. Cross Site Request Forgery A6. Information Leakage and Improper Error Handling A7. Broken Authentication and Session Management A8. Insecure Cryptographic Storage A9. Insecure Communications A10. Failure to Restrict URL Access https://www.owasp.org/index.php/Top_10_2007
  • 10. OWASP Publications - OWASP Top 10 Addressing the Top Ten In Presentation (Future Meetings) February 26 – OWASP Top Ten will be discussed March 25 – OWASP Testing Guide will be discussed On the Mailing List The mailing list is a public forum, and as such is suitable for asking questions in general Specific application issues should be discussed in private, especially with regards to business projects Focus Groups If there is sufficient interest, focus groups can be created to discuss specific issues from the perspective of secure design/threat modeling, secure coding, source code analysis, security tests
  • 11. OWASP Publications - OWASP Guide Guide to Building Secure Web Applications Provides a baseline for developing secure software Introduction to security in general Introduction to application level security Discusses key implementation areas Architecture Authentication Session Management Access Controls and Authorization Event Logging Data Validation
  • 12. OWASP Publications - OWASP Guide Future Topics regarding the Guide In Presentation (Future Meetings) Following the Top Ten presentations specific issues will be addressed in monthly meetings On the Mailing List The focus of the OWASP group is to address all questions pertaining to application security, of any level of technical ability Focus Groups If there is sufficient interest, focus groups can be created to discuss specific issues
  • 13. OWASP Publications – OWASP Legal Legal Project Project focused on contracting for secure software Secure Software Contract Annex Targeted towards consultants Addresses secure software concerns between customers and vendors Secure software contracting hypothetical case study Company outsourced web application development to a software shop Company sue the developers on breach of contract for negligence This project does NOT provide legal advice, but rather guidelines from which legal documents can be drafted
  • 14. OWASP Publications – Testing Project Security Testing Guide A framework for testing web applications Testing Best Practices (when to test, what to test and how) Testing Methodologies (manual reviews, threat modeling, code reviews, penetration testing) Testing Tools (black box, white box static parsers, dynamic analyzers, acceptance test tools) Test Cases For Common Web Application Vulnerabilities Criteria for Evaluating The Risk Severity For The Vulnerabilities Reporting Getting the Guide http:// www.owasp.org/index.php/OWASP_Testing_Project
  • 15. OWASP Tools Demo By Blaine Wilson Webscarab web proxy Webgoat Training web site
  • 16. OWASP Software - WebScarab WebScarab A framework for analyzing HTTP/HTTPS traffic Written in Java Multiple Uses Developer: Debug exchanges between client and server Security Analyst: Analyze traffic to identify vulnerabilities Technical Tool Focused on software developers Extensible plug-in architecture Open source; easy to extend core system Very powerful tool Getting the Tool http://www.owasp.org/software/webscarab.html
  • 17. OWASP Software - WebScarab Web Application Client server application using HTTP as the transport. Delegation of tasks between the client and the server
  • 18. OWASP Software - WebScarab Proxy Server Resides between the client and the server Services requests on behave of the client Benefits include; Caching, Content filtering, Reformatting for special browsers (cell phones), Track usage
  • 19. OWASP Software - WebScarab DEMO
  • 20. OWASP Software - WebGoat WebGoat Primarily a training application Provides An educational tool for learning about application security A baseline to test security tools against (i.e. known issues) What is it? A J2EE web application arranged in “Security Lessons” Based on Tomcat and JDK 1.5 Oriented to learning Easy to use Illustrates credible scenarios Teaches realistic attacks, and viable solutions
  • 21. OWASP Software - WebGoat WebGoat – What can you learn? A number of constantly growing attacks and solutions Cross Site Scripting SQL Injection Attacks Thread Safety Field & Parameter Manipulation Session Hijacking and Management Weak Authentication Mechanisms Many more attacks added Getting the Tools http://www.owasp.org/software/webgoat.html Simply download, unzip, and execute
  • 22. OWASP Software – WebGoat DEMO Warning Using what you have learned on your company’s web applications will get you fired.
  • 23. OWASP Cincinnati Local Chapter The main objective it to building a community Local Chapters provide opportunities for OWASP members to share ideas and learn information security, several locations around the world: http:// www.owasp.org/apps/maps/index.jsp Open to all; any level of proficiency Provide a forum to discuss issues based on local regulation and legislation Provide venue for invited guests to present new ideas and projects To join a chapter, simply sign up on the appropriate mailing list
  • 24. OWASP Cincinnati Local Chapter Started October 2007 Need to establish a web application security community to serve security professionals Support from Citigroup (location, speakers) What do we have to offer? Monthly Meetings Mailing List Presentations & Groups Open Forums for Discussion Vendor Neutral Environments
  • 25. OWASP Cincinnati Local Chapter What do we have to offer? Monthly Meetings An opportunity to listen to monthly presentations introducing OWASP (prior to regular meetings) An opportunity to attend special presentations focused on OWASP projects, and focusing on specific areas of interest An opportunity to work with organizers to show additional presentations and develop workshops to address specific issues An open environment for discussion of information security suitable for novices, professionals, and experts Free Coffee!!!!!
  • 26. OWASP Cincinnati Local Chapter What do we have to offer? Mailing Lists A wide selection of mailing lists are available from the OWASP main page, including specific mailing lists for all topics covered today https:// lists.owasp.org/mailman/listinfo A local mailing list which can be used to arrange focus groups, monthly meetings, and discuss issues of importance locally ttps://lists.owasp.org/mailman/listinfo/owasp-cincinnati Rules Keep it professional; most subscribers currently receive messages to business accounts No sales or marketing materials; the list will be restricted to subscribers, however if spam becomes an issue moderation will be enforced
  • 27. OWASP Cincinnati Local Chapter What do we have to offer? Informative Presentations Every monthly meeting will host a 60 minute presentation on a new topic or area of interest Strong focus on building understanding of technical issues If enough interest is generated, specialized presentations can be scheduled Focus Groups As the organization grows focus groups may form allowing for focused discussion outside of monthly meetings Formalized focused groups can be created to tackle specific issues
  • 28. OWASP Cincinnati Local Chapter What do we have to offer? Vendor Neutral Environments Learn about security without the sales pitches OWASP does not sells: all revenue generated from either website advertising or donations Vendor Neutral Environments Strict guidelines for chapter presentations and sponsorship All sponsors must be approved by The OWASP Foundation. No product presentations ! Presentations that focus on a problem or set of problems and discuss solution approaches that may refer to or show examples of various products are allowed. Sponsorship shall be in the form of donations to The OWASP Foundation in the name of the local chapter and to provide food / beverages at meeting events.
  • 29. OWASP Cincinnati Local Chapter What do we have to offer? Stable location to held meeting at Citigroup 9997 Carver Road Blue Ash, Ohio Proposed Meeting Schedule Last Tuesday of Each Month Jan 29 Feb 26 Mar 25 TBDs
  • 30. OWASP Cincinnati Local Chapter What can you offer? Mailing Lists Participate to the mailing lists, meetings, and focus groups are open forums for discussion of any relevant topics Mailing Lists Become a Member http:// www.owasp.org/index.php/Membership Participate in OWASP projects Contribute to existing projects Propose new projects Spearhead new ventures Participate in the Local Chapter Reach out the executive board (email contact information is available on local chapter site) Encourage others to subscribe to the email list (full contact information can be elicited via email)
  • 31. OWASP Cincinnati Local Chapter Next Meeting Feb 26, 2007 5.30 PM-7 PM Presentation: 2007 OWASP Top Ten, Marco Morana Location: Citigroup Campus Buckeyes Room First Floor 9997 Carver Road Blue Ash, Ohio
  • 32. Final Questions Further questions on OWASP organization, local chapter, tools demo Presentation will be online: http://www.owasp.org/index.php/Cincinnati Thank you for attending!