A Developer's Guide to Pentesting: Find Security Vulnerabilities in Your Softwar


Details
Thanks to ISystems (http://www.evolutionhcm.com/about-us/careers) for sponsoring pizza and soda for this meetup!
For the last several years, Bill has taken his twenty years of web development experience to application pentesting. Although he didn't have a televised event to announce ‘the decision,’ he has gathered a vast collection of the real problems he has discovered in the majority of applications that he has tested. Reflected XSS, injection of all types, and privilege escalation are rampant, and that is only the beginning. What’s more, he hasn't tested an application yet that had sufficient protection to keep him from breaking in and causing havoc. Come hear what they are, how they intersect with the OWASP Top 10, and what you can say to your developers to make the problems go away.
More from Bill:
Hi, everyone! I am very much looking forward to my trip to Vermont next month. For those not familiar with pentesting, it is a type of software testing that specifically looks for security vulnerabilities. This is how people take over your applications, and make them do things that you didn't want them to do.
I'll talk about a lot of the vulnerabilities that I find in code, and how to fix them. Then I'll show you some (free!) tools that you can use to practice finding bugs in your own code. Should be a good time. Look forward to meeting you all.
About Bill:
OWASP (https://www.owasp.org/index.php/Main_Page) InfoSec expert and lock breaker, Bill Sempf.
Bill Sempf is a software security architect. His breadth of experience includes business and technical analysis, software design, development, testing, server management and maintenance, and security. In his 20 years of professional experience he has participated in the creation of well over 200 applications for large and small companies, managed the software infrastructure of two Internet service providers, coded complex software happily in every environment imaginable, tested the security of all natures of applications and APs, and made mainframes talk to cell phones. He is the author of C# 5 All in One for Dummies and Windows 8 Programming with HTML5 For Dummies; a coauthor of Effective Visual Studio.NET and many other books, a frequent contributor to industry magazines; and has recently been an invited speaker for the ACM and IEEE, BlackHat, CodeMash, DerbyCon, BSides, DevEssentials, the International XML Web Services Expo and the Association of Information Technology Professionals. Bill also serves on the board of the Columbus branch of the Open Web Application Security Project, and is the Administrative Director of Locksport International.
Bill's blog: http://www.sempf.net/
Twitter: @sempf

A Developer's Guide to Pentesting: Find Security Vulnerabilities in Your Softwar