<span style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)">All,</span><div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)"><br></div>
<div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)">Looking forward to see you all on Tuesday, 6:30PM & UAT.  Details below:</div><div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)">
<br></div><blockquote style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255);margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
<div><b>Not the end of XSS</b></div><div><b><br></b></div><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes</blockquote><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well</blockquote><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are</blockquote><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
used to protect a web application and how they can be abused by an attacker.</blockquote><div><br></div><div><b>Michael Brooks</b></div><div><br></div><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written</blockquote><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
exploits for software you have probably used, patches have been written and we are all safer for it. A</blockquote><blockquote style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:40px;border-top-style:none;border-right-style:none;border-bottom-style:none;border-left-style:none;border-width:initial;border-color:initial;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px">
perfectly secure system can never be accomplished, test everything, trust nothing.</blockquote></blockquote><div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)"><br></div><div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)">
Please expect this next month's meeting to go a small bit longer as we going to have some chapter updates initially.</div><div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)">
<br></div><div style="color:rgb(34,34,34);font-family:verdana;font-size:13px;background-color:rgb(255,255,255)">-Andrew</div><div><br></div>-- <br><div><font face="sans-serif"><span style="line-height:19px">We are so dazzled by the speed and expanding applications of technology that we begin to think it is an adequate substitute for what it replaces. - Peter Block</span></font></div>
<br>