<div dir="ltr"><div>Justin, <br><br>Thanks again for putting everything together last night. It was a great time!<br><br></div>Patrick <br></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Wed, Jan 9, 2013 at 8:55 AM, Justin C. Klein Keane <span dir="ltr"><<a href="mailto:jukeane@sas.upenn.edu" target="_blank">jukeane@sas.upenn.edu</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA1<br>
<br>
Hey all,<br>
<br>
  If you weren't at last night's meeting you missed an excellent (I<br>
thought) exposition on virtual networking, delivered very impromptu,<br>
by myself ;)  Actually the capture the flag exercise went a lot better<br>
than I thought.  Everyone was able to get the target and a BackTrack<br>
virtual machine up and running, and attack the target at least a<br>
little.  There were some folks who managed to complete the exercise in<br>
the hour we had, but hopefully everyone got some good exposure to<br>
using some new tools in a safe testing environment.<br>
<br>
  For the folks who couldn't make it, you can download the exercise<br>
from<br>
<a href="https://sourceforge.net/projects/lampsecurity/files/CaptureTheFlag/CTF7/" target="_blank">https://sourceforge.net/projects/lampsecurity/files/CaptureTheFlag/CTF7/</a><br>
(download CTF7plusDocs.zip).  Note that there are other "releases" of<br>
that project that are actually other exercises (CTF4, CTF5, and CTF6<br>
are complete exercises).  If you find any problems or need any help<br>
with the exercise (which includes a full 43 page PDF of instructions<br>
for folks of all technical skill levels), shoot me an e-mail.<br>
<br>
  Also, Cigital has sent out an invitation to a free training event<br>
that they're hosting on Tuesday, January 22 from 8-10:30 AM in their<br>
downtown Philadelphia offices<br>
(<a href="https://cigitaltraining-philadelphia.eventbrite.com/" target="_blank">https://cigitaltraining-philadelphia.eventbrite.com/</a>).  It's a course<br>
on foundations of software security and mobile applications<br>
(<a href="http://www.cigital.com/training/course-information/foundations-of-software-security" target="_blank">http://www.cigital.com/training/course-information/foundations-of-software-security</a>).<br>
 From the invite:<br>
<br>
"Please join<br>
Cigital<<a href="http://cigital.createsend5.com/t/y-i-jddydkd-l-u/" target="_blank">http://cigital.createsend5.com/t/y-i-jddydkd-l-u/</a>>, the<br>
industry leader in software security, for a FREE exclusive training<br>
event<<a href="http://cigital.createsend5.com/t/y-i-jddydkd-l-o/" target="_blank">http://cigital.createsend5.com/t/y-i-jddydkd-l-o/</a>> discussing<br>
the foundations of software security and creating mobile applications<br>
taught by Cigital Principal and author of Hacking Exposed, Joel<br>
Scambray. For more information regarding this 2-hour event on Tuesday,<br>
January 22, 2013, please click<br>
here<<a href="http://cigital.createsend5.com/t/y-i-jddydkd-l-b/" target="_blank">http://cigital.createsend5.com/t/y-i-jddydkd-l-b/</a>>.<br>
Looking forward to seeing you at this exclusive event!<br>
Best Regards,<br>
Steven Kelly"<br>
<br>
  Hope to see you all at the next OWASP meeting, which should be out<br>
in the burbs, for a change!<br>
<br>
Cheers,<br>
<br>
- --<br>
Justin C. Klein Keane, MA MCIT<br>
Information Security<br>
University of Pennsylvania, School of Arts & Sciences<br>
<br>
The PGP signature on this email can be verified using the public key at<br>
<a href="https://sites.sas.upenn.edu/kleinkeane" target="_blank">https://sites.sas.upenn.edu/kleinkeane</a><br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v1.4.12 (GNU/Linux)<br>
Comment: Using GnuPG with undefined - <a href="http://www.enigmail.net/" target="_blank">http://www.enigmail.net/</a><br>
<br>
iQIcBAEBAgAGBQJQ7XbfAAoJEIH7slQlJAgKa1MP+gNkiUCNFWFEdWF5Jcm4rV+1<br>
cyngYc6waxQ0AxJU4XPHr9co8KqJSZF++zfuq+yTSFe9YjkMGy04xg+YcwHOe++I<br>
PfLVkKTuLoOxNX4G9Tzzu7+AubhgvEZa74aw8Kleigc47Ye+45ZhuKih3OVW+cxm<br>
wTrvsMXCxLsO+37oayHXgFziaqPS3/wuFFN7ibgOjNuXY90SUzTvcm+/xQ0XTCV2<br>
9fY469p8Ip4WZDLVa2GzMuLkqF+wjF16jc9TnE70M/fyfZAmL1gkNzGj15gC1gB7<br>
vmkn2AhNVy5b67R4qHiHLq56velMC1Kzj27fUW01ttYNBiy9jGsiK+EeV+iC/6ew<br>
rO/DVRMaGU/WnagMJc+ZkBKzrqG7VDJ+A6Sbt/bj8Zm0lICyRisSSlZHfM3JFAIc<br>
5dvJeBJcAmeTb+a6ktm/9ZaaEwu/h+neu8IXBHODZrAXINebKqljbRVuvr40pjWb<br>
ddCOLTHKSsnPL/G3rJxNu6DtOm968ckGbEwtaMjg6jYgUoJilZuJX2blXEKfTNcu<br>
e4lo4RlA2xNDDSLYZzdPjfcLPm8tLZE9W+/UtSt/cQktrhEqr/Uk3fZE5A8y5Rb3<br>
DDygnnwvci4oy0ZgK+pHAUG66dSvuzi0vA6UEpwaINDwdSEn6mmg5NjGoqQW3F41<br>
8P3+swPGzDTSYlS+9yot<br>
=c40h<br>
-----END PGP SIGNATURE-----<br>
_______________________________________________<br>
OWASP-Philadelphia mailing list<br>
<a href="mailto:OWASP-Philadelphia@lists.owasp.org">OWASP-Philadelphia@lists.owasp.org</a><br>
<a href="https://lists.owasp.org/mailman/listinfo/owasp-philadelphia" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-philadelphia</a><br>
</blockquote></div><br></div>