<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Erachner</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Erachner"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Erachner"/>
		<updated>2026-04-26T02:53:18Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Europe_2008_-_Belgium&amp;diff=28225</id>
		<title>OWASP AppSec Europe 2008 - Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Europe_2008_-_Belgium&amp;diff=28225"/>
				<updated>2008-04-21T03:37:47Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_banner_EU08.jpg]]&lt;br /&gt;
&lt;br /&gt;
Welcome to the European OWASP Application Security Conference! After successful OWASP Conferences in the United States and Europe, we are back in Belgium: 5 tutorials and 2 conference tracks in the historic center of Ghent on May 19-22 2008! &lt;br /&gt;
&lt;br /&gt;
The conference is stuffed with top notch presentations from industry recognised speakers and technical experts on the latest application security risks and trends. New for AppSec Europe: technical vendor demos and a Capture the Flag! &lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:GhentEU2008.JPG]]&lt;br /&gt;
&lt;br /&gt;
The historic center of  [http://en.wikipedia.org/wiki/Ghent Ghent], Belgium May 19th-22nd.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_AppSec_Europe_2008_-_Belgium/Training | Tutorial Days: May 19th-20th]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_AppSec_Europe_2008_-_Belgium/Agenda | Main Conference: May 21st-22nd]]&lt;br /&gt;
&lt;br /&gt;
'''Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]'''&lt;br /&gt;
&lt;br /&gt;
'''If you are registering as a Speaker or Sponsor, please use the following link: [http://guest.cvent.com/i.aspx?4W,M3,49b0aaab-82ef-4a36-a982-6e56a485c531 Cvent link for speakers/sponsors]'''&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations - May 21-22==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days. As in the previous editions, the OWASP AppSec Europe 2008 conference will feature a refereed papers track.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - May 21, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:05 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec 2008 Conference &lt;br /&gt;
''Sebastien Deleersnyder''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:05-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: The Great Information Security Scrap Yard Challenge&lt;br /&gt;
''Mark Curphey, Microsoft''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Owasp State of the Union&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:40-11:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_The_OWASP_ESAPI_project | The OWASP ESAPI project]]&lt;br /&gt;
''[[User:Wichers | Dave Wichers]], Aspect Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What's_hot_for_2008 | Trends in Web Hacking Incidents: What's hot for 2008]]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf], Breach''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls | Evaluation Criteria for Web Application Firewalls]]&lt;br /&gt;
''[http://blog.ivanristic.com Ivan Ristic], Breach''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | HTML5 security&lt;br /&gt;
''Thomas Roessler''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_The_OWASP_ORIZON_project | The OWASP Orizon Project internals]]&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Remo presentation (Positive ModSecurity rulesets / Input validation)&lt;br /&gt;
''Christian Folini''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-14:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls (OWASP German chapter)]]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Google-Hacking and Google-Shielding&lt;br /&gt;
''Amichai Shulman''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_NTLM_Relay_Attacks | NTLM Relay Attacks]]&lt;br /&gt;
''Eric Rachner''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | PHPIDS Monitoring attack surface activity&lt;br /&gt;
''Mario Heiderich''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Agile_Security_Breaking_the_Waterfall_Mindset | Agile Security - Breaking the Waterfall Mindset of the Security Industry]]&lt;br /&gt;
''[[User:Wichers | Dave Wichers]], Aspect Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security framework is not in the code&lt;br /&gt;
''Sam Reghenzi''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:10-17:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Exploiting_Online_Games | Exploiting Online Games]]&lt;br /&gt;
''[[User:gem | Gary McGraw]], Cigital''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08 SHIELDS: metrics, tools and Internet services to improve security in application developments | SHIELDS: metrics, tools and Internet services to improve security in application developments]]&lt;br /&gt;
''[[AppSecEU08 Eva Coscia | Eva Coscia]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: “tbd”&lt;br /&gt;
Moderator:tbd&lt;br /&gt;
Panelists: tbd&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Leader Meeting - Organized by Matteo Meucci&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks at the Monasterium&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - May 22, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[AppSecEU08 Software Security State of the Practice 2008 | Software Security: State of the Practice 2008]]&lt;br /&gt;
''[[user:gem | Gary McGraw]], Cigital''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:40-10:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Tour of OWASP projects&lt;br /&gt;
''Dinis Cruz (Chief OWASP Evangelist),  [[User:Wichers | Dave Wichers]] (OWASP Board), Michael Eddington (OWASP Encoding Project, .NET Web Service Validation Project) and Mark Roxberry (OWASP .NET Project)''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:40-11:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Graph Analysis for WebApps: From Nodes to Edges&lt;br /&gt;
''Simon Roses Femerling, Microsoft''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | The OWASP Education Project&lt;br /&gt;
''Martin Knobloch''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking&lt;br /&gt;
''Brian Chess, Fortify''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Threat_Modeling_for_Application_Designers_and_Architects | Threat Modeling for Application Designers &amp;amp; Architects]]&lt;br /&gt;
''[[AppSecEU08 Shay Zalalichin Shay Zalalichin | Shay Zalalichin]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  &lt;br /&gt;
[[AppSecEU08_Scanstud_-_Evaluating_static_analysis_tools | Scanstud: Evaluating static analysis tools]]&lt;br /&gt;
&lt;br /&gt;
''[http://www.informatik.uni-hamburg.de/SVS/personnel/martin/index.php Martin Johns]'', ''Moritz Jodeit'', ''Wolfgang Koeppl'', ''Martin Wimmer''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Office 2.0:  Software as a Service, Security on the Sidelines?  &lt;br /&gt;
''John Heasman''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-14:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08 How Data Privacy affects Applications and Databases | How Data Privacy affects Applications and Databases]]&lt;br /&gt;
''[[AppSecEU08 Dirk De Maeyer | Dirk De Maeyer]]''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_The_OWASP_Anti-Samy_project | The OWASP Anti-Samy project]]&lt;br /&gt;
''Jason Li, Aspect Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Input_validation:_the_Good,_the_Bad_and_the_Ugly| &lt;br /&gt;
Input validation: the Good, the Bad and the Ugly]]&lt;br /&gt;
[[Johan_Peeters|''Johan Peeters'']]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:10-17:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Client-side security&lt;br /&gt;
''pdp''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Responsible &amp;quot;tbd&amp;quot;&lt;br /&gt;
Moderator: tbd&lt;br /&gt;
&lt;br /&gt;
Panelists: tbd&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: &amp;quot;tbd&amp;quot;&lt;br /&gt;
Moderator: tbd&lt;br /&gt;
Panelists: tbd&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair &lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Venue: Aula, Ghent University, Voldersstraat 9, 9000 Ghent [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Voldersstraat+9,+9000+Gent&amp;amp;jsv=107&amp;amp;sll=50.994753,3.745665&amp;amp;sspn=0.154284,0.466919&amp;amp;ie=UTF8&amp;amp;ll=51.054749,3.723121&amp;amp;spn=0.00963,0.029182&amp;amp;z=15&amp;amp;iwloc=addr Google Maps Link] &lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]&lt;br /&gt;
&lt;br /&gt;
==Tutorial Days -  May 19-20== &lt;br /&gt;
&lt;br /&gt;
OWASP arranged for several Application Security tutorials on May 19th-20th, the days prior to the conference. &lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Building and Testing Secure Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts. This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
Trainer: Jason Li, [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Leading the Development of Secure Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process. The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. &lt;br /&gt;
&lt;br /&gt;
Trainer: Arshan Dabirsiaghi, [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Building Secure Rich Internet Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development. &lt;br /&gt;
&lt;br /&gt;
Trainer: Arshan Dabirsiaghi, [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Building Secure Web Services &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! &lt;br /&gt;
&lt;br /&gt;
Trainer: [[User:wichers | Dave Wichers]], [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Open Source ModSecurity Training &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. &lt;br /&gt;
&lt;br /&gt;
Trainer: Ryan Barnett, Breach - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
|}&lt;br /&gt;
More information about the tutorials are [[OWASP_AppSec_Europe_2008_-_Belgium/Training | online]].&lt;br /&gt;
&lt;br /&gt;
Venue: Monasterium PoortAckere, Oude Houtlei 56, 9000 Gent [http://www.monasterium.be/ http://www.monasterium.be/]&lt;br /&gt;
&lt;br /&gt;
==Evening Social Event - May 21==&lt;br /&gt;
&lt;br /&gt;
At every conference we have an evening social event the first night. This allows participants to have some unstructured time to mingle with the other attendees. They are always fun and typically attract about half the conference attendees. This year's event will be a Flemish buffet with special Belgian beers at the Monasterium (near the conference location).&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
* OWASP arranged for a room block of 20 Executive Deluxe rooms at the [http://www.nh-hotels.com/nh/en/hotels/belgium/ghent/nh-gent-belfort.html NH Gent Belfort] at a rate of €199 per night. This room block is being held through April 11!! After that date, there is no guarantee that rooms at this rate will be available at the NH Gent Belfort.&lt;br /&gt;
* OWASP attendees have an option for 20 rooms at € 122 and 10 rooms at € 132 per night at the [http://www.monasterium.be Hotel Monasterium PoortAckere] up until April 30. Use OWASP as reference when booking your room. Please note that there are no more rooms for the night of May 22.&lt;br /&gt;
* OWASP arranged for a room block of 25 rooms at the IBIS hotels. You can already contact them on [http://www.ibishotel.com/ibis/fichehotel/gb/ibi/1455/fiche_hotel.shtml Hotel Ibis Gent Centrum Opera] (€ 89 per night - 10 rooms) and [http://www.ibishotel.com/ibis/fichehotel/gb/ibi/0961/fiche_hotel.shtml Hotel Ibis Gent Centrum Kathedraal] (€ 99 per night - 15 rooms of which 3 still available for the 22nd) - reservations through e-mail: H0961-RE at accor.com or fax: 0032/9 233 10 00 (before April 19 - reference OWASP).&lt;br /&gt;
&lt;br /&gt;
It is difficult getting rooms at reduced prices, as there is a medical congress around the same time in Ghent. You will find it difficult to get a room for the night of May 22. We recommend you then book a room for one night near the airport of [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=hotels+zaventem,+belgium&amp;amp;ie=UTF8&amp;amp;z=11 Brussels].&lt;br /&gt;
&lt;br /&gt;
The following is a list of nearby accommodations that may have availability:&lt;br /&gt;
&lt;br /&gt;
* [http://www.gent.be/eCache/THE/44/235.html List of hotels in Ghent]&lt;br /&gt;
* [http://www.hotelnazareth.be/ Hotel Vandervalken Nazareth - on Highway 5 minutes from Ghent]&lt;br /&gt;
* [http://www.bedandbreakfast-gent.be/en/home.php A list of bed and breakfasts in Ghent]&lt;br /&gt;
* [http://www.jeugdherbergen.be/jeugdherbergen/gent/ Youth hostels in Ghent]&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]&lt;br /&gt;
&lt;br /&gt;
The conference fee for this conference is :&lt;br /&gt;
&lt;br /&gt;
* Standard: 350 Euros, OWASP Members: 300 Euros, Students: 225 Euros. &lt;br /&gt;
* Conference Dinner (Evening of May 21st): 50 Euros&lt;br /&gt;
* Conference Tutorials: 825 Euros, Student Fee: 430 Euros&lt;br /&gt;
* [http://2008.confidence.org.pl/ CONFidence Poland 2008] members get a € 35 reduction on OWASP (see OWASP On a Plane below).&lt;br /&gt;
* [http://www.issa-be.org ISSA], [http://www.isaca.be ISACA] and [http://www.lsec.be L-SEC] Members get a € 35 reduction.&lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==OWASP on a Plane - CONFidence 2008==&lt;br /&gt;
This year's [http://2008.confidence.org.pl/lang-pref/en/ CONFidence 2008] will take place on 16-17.05.2008 in Cracow (Poland). They have decided to spend Saturday morning talking about OWASP-related projects. No more excuses: you can attend 2 OWASP events in a row in Europe!&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
2008 EU Planning Committee Chair: Sebastien Deleersnyder - Telindus - seba 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' cigital.com&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Pieter Danhieux - Ernst &amp;amp; Young - pieter.danhieux 'at' be.ey.com&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Lieven Desmet - KU Leuven - Lieven.Desmet 'at' cs.kuleuven.ac.be&lt;br /&gt;
&lt;br /&gt;
== Affiliated Partners ==&lt;br /&gt;
We are glad to have the local support of:&lt;br /&gt;
* ISACA&lt;br /&gt;
* ISSA&lt;br /&gt;
* L-SEC&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring an OWASP conference, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Europe_2008_-_Belgium&amp;diff=28224</id>
		<title>OWASP AppSec Europe 2008 - Belgium</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Europe_2008_-_Belgium&amp;diff=28224"/>
				<updated>2008-04-21T03:32:24Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: Fixing the link to the Aspect logo to use https instead of http -- this suppresses an annoying warning message displayed by interenet explorer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Owasp_banner_EU08.jpg]]&lt;br /&gt;
&lt;br /&gt;
Welcome to the European OWASP Application Security Conference! After successful OWASP Conferences in the United States and Europe, we are back in Belgium: 5 tutorials and 2 conference tracks in the historic center of Ghent on May 19-22 2008! &lt;br /&gt;
&lt;br /&gt;
The conference is stuffed with top notch presentations from industry recognised speakers and technical experts on the latest application security risks and trends. New for AppSec Europe: technical vendor demos and a Capture the Flag! &lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:GhentEU2008.JPG]]&lt;br /&gt;
&lt;br /&gt;
The historic center of  [http://en.wikipedia.org/wiki/Ghent Ghent], Belgium May 19th-22nd.&lt;br /&gt;
&lt;br /&gt;
[[OWASP_AppSec_Europe_2008_-_Belgium/Training | Tutorial Days: May 19th-20th]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_AppSec_Europe_2008_-_Belgium/Agenda | Main Conference: May 21st-22nd]]&lt;br /&gt;
&lt;br /&gt;
'''Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]'''&lt;br /&gt;
&lt;br /&gt;
'''If you are registering as a Speaker or Sponsor, please use the following link: [http://guest.cvent.com/i.aspx?4W,M3,49b0aaab-82ef-4a36-a982-6e56a485c531 Cvent link for speakers/sponsors]'''&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations - May 21-22==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days. As in the previous editions, the OWASP AppSec Europe 2008 conference will feature a refereed papers track.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 - May 21, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:05 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to OWASP AppSec 2008 Conference &lt;br /&gt;
''Sebastien Deleersnyder''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:05-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: The Great Information Security Scrap Yard Challenge&lt;br /&gt;
''Mark Curphey, Microsoft''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Owasp State of the Union&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:40-11:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_The_OWASP_ESAPI_project | The OWASP ESAPI project]]&lt;br /&gt;
''[[User:Wichers | Dave Wichers]], Aspect Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What's_hot_for_2008 | Trends in Web Hacking Incidents: What's hot for 2008]]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf], Breach''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls | Evaluation Criteria for Web Application Firewalls]]&lt;br /&gt;
''[http://blog.ivanristic.com Ivan Ristic], Breach''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | HTML5 security&lt;br /&gt;
''Thomas Roessler''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_The_OWASP_ORIZON_project | The OWASP Orizon Project internals]]&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Remo presentation (Positive ModSecurity rulesets / Input validation)&lt;br /&gt;
''Christian Folini''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-14:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls (OWASP German chapter)]]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Google-Hacking and Google-Shielding&lt;br /&gt;
''Amichai Shulman''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | NTLM Relay Attacks&lt;br /&gt;
''Eric Rachner''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | PHPIDS Monitoring attack surface activity&lt;br /&gt;
''Mario Heiderich''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Agile_Security_Breaking_the_Waterfall_Mindset | Agile Security - Breaking the Waterfall Mindset of the Security Industry]]&lt;br /&gt;
''[[User:Wichers | Dave Wichers]], Aspect Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security framework is not in the code&lt;br /&gt;
''Sam Reghenzi''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:10-17:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Exploiting_Online_Games | Exploiting Online Games]]&lt;br /&gt;
''[[User:gem | Gary McGraw]], Cigital''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08 SHIELDS: metrics, tools and Internet services to improve security in application developments | SHIELDS: metrics, tools and Internet services to improve security in application developments]]&lt;br /&gt;
''[[AppSecEU08 Eva Coscia | Eva Coscia]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: “tbd”&lt;br /&gt;
Moderator:tbd&lt;br /&gt;
Panelists: tbd&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-19:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Leader Meeting - Organized by Matteo Meucci&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks at the Monasterium&lt;br /&gt;
 |-&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 - May 22, 2008&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-09:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Coffee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-9:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[AppSecEU08 Software Security State of the Practice 2008 | Software Security: State of the Practice 2008]]&lt;br /&gt;
''[[user:gem | Gary McGraw]], Cigital''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 9:40-10:20 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Tour of OWASP projects&lt;br /&gt;
''Dinis Cruz (Chief OWASP Evangelist),  [[User:Wichers | Dave Wichers]] (OWASP Board), Michael Eddington (OWASP Encoding Project, .NET Web Service Validation Project) and Mark Roxberry (OWASP .NET Project)''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:20-10:40 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:40-11:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Graph Analysis for WebApps: From Nodes to Edges&lt;br /&gt;
''Simon Roses Femerling, Microsoft''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | The OWASP Education Project&lt;br /&gt;
''Martin Knobloch''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:20-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Dynamic Taint Propagation: Finding Vulnerabilities Without Attacking&lt;br /&gt;
''Brian Chess, Fortify''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Threat_Modeling_for_Application_Designers_and_Architects | Threat Modeling for Application Designers &amp;amp; Architects]]&lt;br /&gt;
''[[AppSecEU08 Shay Zalalichin Shay Zalalichin | Shay Zalalichin]]''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  &lt;br /&gt;
[[AppSecEU08_Scanstud_-_Evaluating_static_analysis_tools | Scanstud: Evaluating static analysis tools]]&lt;br /&gt;
&lt;br /&gt;
''[http://www.informatik.uni-hamburg.de/SVS/personnel/martin/index.php Martin Johns]'', ''Moritz Jodeit'', ''Wolfgang Koeppl'', ''Martin Wimmer''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Office 2.0:  Software as a Service, Security on the Sidelines?  &lt;br /&gt;
''John Heasman''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-14:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:40 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08 How Data Privacy affects Applications and Databases | How Data Privacy affects Applications and Databases]]&lt;br /&gt;
''[[AppSecEU08 Dirk De Maeyer | Dirk De Maeyer]]''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:40-15:20 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_The_OWASP_Anti-Samy_project | The OWASP Anti-Samy project]]&lt;br /&gt;
''Jason Li, Aspect Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:20-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Input_validation:_the_Good,_the_Bad_and_the_Ugly| &lt;br /&gt;
Input validation: the Good, the Bad and the Ugly]]&lt;br /&gt;
[[Johan_Peeters|''Johan Peeters'']]&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:10-17:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Client-side security&lt;br /&gt;
''pdp''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.cs.kuleuven.be/~lieven/AppSec2008/program.html Refereed papers track]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-18:00 || style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Responsible &amp;quot;tbd&amp;quot;&lt;br /&gt;
Moderator: tbd&lt;br /&gt;
&lt;br /&gt;
Panelists: tbd&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: &amp;quot;tbd&amp;quot;&lt;br /&gt;
Moderator: tbd&lt;br /&gt;
Panelists: tbd&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:10 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up - Dave Wichers, OWASP Conferences Chair &lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Venue: Aula, Ghent University, Voldersstraat 9, 9000 Ghent [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Voldersstraat+9,+9000+Gent&amp;amp;jsv=107&amp;amp;sll=50.994753,3.745665&amp;amp;sspn=0.154284,0.466919&amp;amp;ie=UTF8&amp;amp;ll=51.054749,3.723121&amp;amp;spn=0.00963,0.029182&amp;amp;z=15&amp;amp;iwloc=addr Google Maps Link] &lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]&lt;br /&gt;
&lt;br /&gt;
==Tutorial Days -  May 19-20== &lt;br /&gt;
&lt;br /&gt;
OWASP arranged for several Application Security tutorials on May 19th-20th, the days prior to the conference. &lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Building and Testing Secure Web Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Most developers, IT professionals, and auditors learn what they know about application security on the job, usually by making mistakes. Application security is just not a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their IT security efforts. This powerful two day course focuses on the most common web application security problems, including the OWASP Top Ten. The course will introduce and demonstrate hacking techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities into their code.&lt;br /&gt;
&lt;br /&gt;
Trainer: Jason Li, [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Leading the Development of Secure Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process. The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. &lt;br /&gt;
&lt;br /&gt;
Trainer: Arshan Dabirsiaghi, [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Building Secure Rich Internet Applications&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development. &lt;br /&gt;
&lt;br /&gt;
Trainer: Arshan Dabirsiaghi, [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Building Secure Web Services &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system! &lt;br /&gt;
&lt;br /&gt;
Trainer: [[User:wichers | Dave Wichers]], [http://www.aspectsecurity.com Aspect Security] - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Open Source ModSecurity Training &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | ModSecurity is currently the most widely deployed web application firewall (WAF) product. This two-day class is for those people who want to learn how to build, deploy, and use ModSecurity in the most effective manner. The course will cover the open source ModSecurity Console, which helps manage alerts on suspicious web activity targeting your web servers. The course also provides an in-depth look at the extremely powerful ModSecurity Rules Language. &lt;br /&gt;
&lt;br /&gt;
Trainer: Ryan Barnett, Breach - [[OWASP_AppSec_Europe_2008_-_Belgium/Training | Read more here!]]&lt;br /&gt;
|}&lt;br /&gt;
More information about the tutorials are [[OWASP_AppSec_Europe_2008_-_Belgium/Training | online]].&lt;br /&gt;
&lt;br /&gt;
Venue: Monasterium PoortAckere, Oude Houtlei 56, 9000 Gent [http://www.monasterium.be/ http://www.monasterium.be/]&lt;br /&gt;
&lt;br /&gt;
==Evening Social Event - May 21==&lt;br /&gt;
&lt;br /&gt;
At every conference we have an evening social event the first night. This allows participants to have some unstructured time to mingle with the other attendees. They are always fun and typically attract about half the conference attendees. This year's event will be a Flemish buffet with special Belgian beers at the Monasterium (near the conference location).&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
* OWASP arranged for a room block of 20 Executive Deluxe rooms at the [http://www.nh-hotels.com/nh/en/hotels/belgium/ghent/nh-gent-belfort.html NH Gent Belfort] at a rate of €199 per night. This room block is being held through April 11!! After that date, there is no guarantee that rooms at this rate will be available at the NH Gent Belfort.&lt;br /&gt;
* OWASP attendees have an option for 20 rooms at € 122 and 10 rooms at € 132 per night at the [http://www.monasterium.be Hotel Monasterium PoortAckere] up until April 30. Use OWASP as reference when booking your room. Please note that there are no more rooms for the night of May 22.&lt;br /&gt;
* OWASP arranged for a room block of 25 rooms at the IBIS hotels. You can already contact them on [http://www.ibishotel.com/ibis/fichehotel/gb/ibi/1455/fiche_hotel.shtml Hotel Ibis Gent Centrum Opera] (€ 89 per night - 10 rooms) and [http://www.ibishotel.com/ibis/fichehotel/gb/ibi/0961/fiche_hotel.shtml Hotel Ibis Gent Centrum Kathedraal] (€ 99 per night - 15 rooms of which 3 still available for the 22nd) - reservations through e-mail: H0961-RE at accor.com or fax: 0032/9 233 10 00 (before April 19 - reference OWASP).&lt;br /&gt;
&lt;br /&gt;
It is difficult getting rooms at reduced prices, as there is a medical congress around the same time in Ghent. You will find it difficult to get a room for the night of May 22. We recommend you then book a room for one night near the airport of [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=hotels+zaventem,+belgium&amp;amp;ie=UTF8&amp;amp;z=11 Brussels].&lt;br /&gt;
&lt;br /&gt;
The following is a list of nearby accommodations that may have availability:&lt;br /&gt;
&lt;br /&gt;
* [http://www.gent.be/eCache/THE/44/235.html List of hotels in Ghent]&lt;br /&gt;
* [http://www.hotelnazareth.be/ Hotel Vandervalken Nazareth - on Highway 5 minutes from Ghent]&lt;br /&gt;
* [http://www.bedandbreakfast-gent.be/en/home.php A list of bed and breakfasts in Ghent]&lt;br /&gt;
* [http://www.jeugdherbergen.be/jeugdherbergen/gent/ Youth hostels in Ghent]&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Registration is available via the OWASP Conference Cvent site at: [http://guest.cvent.com/i.aspx?4W,M3,7b36ecdc-1234-4d63-bc08-898a7bf60b2a Cvent link]&lt;br /&gt;
&lt;br /&gt;
The conference fee for this conference is :&lt;br /&gt;
&lt;br /&gt;
* Standard: 350 Euros, OWASP Members: 300 Euros, Students: 225 Euros. &lt;br /&gt;
* Conference Dinner (Evening of May 21st): 50 Euros&lt;br /&gt;
* Conference Tutorials: 825 Euros, Student Fee: 430 Euros&lt;br /&gt;
* [http://2008.confidence.org.pl/ CONFidence Poland 2008] members get a € 35 reduction on OWASP (see OWASP On a Plane below).&lt;br /&gt;
* [http://www.issa-be.org ISSA], [http://www.isaca.be ISACA] and [http://www.lsec.be L-SEC] Members get a € 35 reduction.&lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accomodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
==OWASP on a Plane - CONFidence 2008==&lt;br /&gt;
This year's [http://2008.confidence.org.pl/lang-pref/en/ CONFidence 2008] will take place on 16-17.05.2008 in Cracow (Poland). They have decided to spend Saturday morning talking about OWASP-related projects. No more excuses: you can attend 2 OWASP events in a row in Europe!&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
2008 EU Planning Committee Chair: Sebastien Deleersnyder - Telindus - seba 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Pravir Chandra - Cigital - chandra 'at' cigital.com&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Pieter Danhieux - Ernst &amp;amp; Young - pieter.danhieux 'at' be.ey.com&lt;br /&gt;
&lt;br /&gt;
Refereed Papers Chair: Lieven Desmet - KU Leuven - Lieven.Desmet 'at' cs.kuleuven.ac.be&lt;br /&gt;
&lt;br /&gt;
== Affiliated Partners ==&lt;br /&gt;
We are glad to have the local support of:&lt;br /&gt;
* ISACA&lt;br /&gt;
* ISSA&lt;br /&gt;
* L-SEC&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are sponsors for this conference. If you are interested in sponsoring an OWASP conference, please contact OWASP at: conferences 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecEU08_NTLM_Relay_Attacks&amp;diff=28223</id>
		<title>AppSecEU08 NTLM Relay Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecEU08_NTLM_Relay_Attacks&amp;diff=28223"/>
				<updated>2008-04-21T03:29:05Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''NTLM Relay Attacks'''&lt;br /&gt;
&lt;br /&gt;
NTLM relay attacks have been around for years. Since 2001, in fact. Until now, every implementation of this attack has been SMB-based, using it to access the victim’s hidden c$ file share.  But NTLM relay attacks can be launched against any protocol that uses NTLM authentication. Besides SMB, that includes more or less every Microsoft enterprise software product, and more or less every third-party app ever to leverage Windows Integrated Authentication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Simply put, whenever an Active Directory domain user authenticates to a web server in a Windows enterprise environment, that web server's operator can then access ''arbitrary network resources'' as the victim. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Although this vulnerability has been exploitable for over seven years, nobody has paid much attention to the fact that it can also be used to access HTTP-based resources -- until now.  In this talk, Eric Rachner will demonstrate Scurvy, a new tool for launching NTLM relay attacks.  The underlying mechanics of NTLM relay attacks will also be discussed, along with mitigation options.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker:''' Eric Rachner is an independent security consultant, researcher, and enthusiast specializing in security analysis and penetration testing of network applications and systems.  He began his career at Microsoft in 1994, where in 2002 he helped Microsoft start the Application Consulting Engineering (ACE) team, leading efforts such as application penetration testing, code reviews, design reviews of applications throughout Microsoft's global IT organization. In 2005, Eric left Microsoft to pursue an independent career, providing services to large global enterprises in North America and Europe. Outside of the office, his hobbies include motorsports and yet still more IT security activity; he was also a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con in 1999, 2000, and 2001.&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecEU08_NTLM_Relay_Attacks&amp;diff=28222</id>
		<title>AppSecEU08 NTLM Relay Attacks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecEU08_NTLM_Relay_Attacks&amp;diff=28222"/>
				<updated>2008-04-21T03:21:57Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: New page: '''NTLM Relay Attacks'''  NTLM relay attacks have been around for years. Since 2001, in fact. Until now, every implementation of this attack has been SMB-based, using it to access the vict...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''NTLM Relay Attacks'''&lt;br /&gt;
&lt;br /&gt;
NTLM relay attacks have been around for years. Since 2001, in fact. Until now, every implementation of this attack has been SMB-based, using it to access the victim’s hidden c$ file share.&lt;br /&gt;
&lt;br /&gt;
But NTLM relay attacks can be launched against any protocol that uses NTLM authentication. Besides SMB, that includes more or less every Microsoft enterprise software product, and more or less every third-party app ever to leverage Windows Integrated Auth. &lt;br /&gt;
&lt;br /&gt;
In the simplest scenario, whenever an Active Directory domain user authenticates to a web server in a Windows enterprise environment, that web server's operator can then access '''arbitrary network resources''' as the victim. &lt;br /&gt;
&lt;br /&gt;
Although people have been exploiting this problem for seven years, nobody has paid much attention to the fact that it can also be used to access HTTP-based resources until now.&lt;br /&gt;
&lt;br /&gt;
In this talk, Eric Rachner will demonstrate Scurvy, a new tool for launching NTLM relay attacks.  The underlying mechanics of NTLM relay attacks will also be discussed, along with mitigation options.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker:''' Eric Rachner is an independent security consultant, researcher, and enthusiast specializing in security analysis, vulnerability assessment, and penetration testing of network applications and systems.  He began his career at Microsoft in 1994, where in 2002 he helped Microsoft start the Application Consulting Engineering (ACE) team.  As a senior member of the ACE team, he led efforts such as application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. Also during this time, he wrote the feature article for the August 2004 issue of asp.net PRO Magazine on the subject of the attack technique that has since become known as Cross-Site Request Forgery. &lt;br /&gt;
&lt;br /&gt;
In 2005, Eric left Microsoft to pursue an independent career as a security consultant providing services to large global enterprises in North America and Europe. Outside of the office, his hobbies include motorsports and yet still more IT security activity; he was also a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con in 1999, 2000, and 2001.&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=XPATH_Injection&amp;diff=18004</id>
		<title>XPATH Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=XPATH_Injection&amp;diff=18004"/>
				<updated>2007-04-23T13:33:01Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: Cleaning up references to &amp;quot;XML injection&amp;quot; where &amp;quot;XPath injection&amp;quot; is more accurate&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Author==&lt;br /&gt;
Contact Author: [mailto:mark.bradshaw@gmail.com Mark Bradshaw]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Similar to SQL Injection, XPath Injection attacks occur when a web site uses user-supplied information to constract an XPath query for XML data.  By sending intentionally malformed information into the web site, an attacker can find out how the XML data is structured or access data that they may not normally have access to.  They may even be able to elevate their privileges on the web site if the xml data is being used for authentication (such as an xml based user file).&lt;br /&gt;
&lt;br /&gt;
Querying XML is done with XPath, a type of simple descriptive statement that allows the xml query to locate a piece of information.  Like SQL you can specify certain attributes to find and patterns to match.  When using XML for a web site it is common to accept some form of input on the query string to identify the content to locate and display on the page.  This input '''must''' be sanitized to verify that it doesn't mess up the XPath query and return the wrong data.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
We'll use this xml snippet for the examples.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;utf-8&amp;quot;?&amp;amp;gt;&lt;br /&gt;
&amp;amp;lt;Employees&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;Employee ID=&amp;quot;1&amp;quot;&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;FirstName&amp;amp;gt;Arnold&amp;amp;lt;/FirstName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;LastName&amp;amp;gt;Baker&amp;amp;lt;/LastName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;UserName&amp;amp;gt;ABaker&amp;amp;lt;/UserName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Password&amp;amp;gt;SoSecret&amp;amp;lt;/Password&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Type&amp;amp;gt;Admin&amp;amp;lt;/Type&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/Employee&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;Employee ID=&amp;quot;2&amp;quot;&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;FirstName&amp;amp;gt;Peter&amp;amp;lt;/FirstName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;LastName&amp;amp;gt;Pan&amp;amp;lt;/LastName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;UserName&amp;amp;gt;PPan&amp;amp;lt;/UserName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Password&amp;amp;gt;NotTelling&amp;amp;lt;/Password&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Type&amp;amp;gt;User&amp;amp;lt;/Type&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/Employee&amp;amp;gt;&lt;br /&gt;
&amp;amp;lt;/Employees&amp;amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Suppose we have a user authentication system on a web page that used a data file of this sort to login users.  Once a username and password had been supplied the software might use an XPath to lookup the user such as this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
VB:&lt;br /&gt;
Dim FindUserXPath as String&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; &amp;amp; Request(&amp;quot;Username&amp;quot;) &amp;amp; &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; &amp;amp; Request(&amp;quot;Password&amp;quot;) &amp;amp; &amp;quot;']&amp;quot;&lt;br /&gt;
&lt;br /&gt;
C#:&lt;br /&gt;
String FindUserXPath;&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; + Request(&amp;quot;Username&amp;quot;) + &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; + Request(&amp;quot;Password&amp;quot;) + &amp;quot;']&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With a normal username and password this XPath would work, but an attacker may send a bad username and password and get an xml node selected without knowing the username or password, like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Username: blah' or 1=1 or 'a'='a&lt;br /&gt;
Password: blah&lt;br /&gt;
&lt;br /&gt;
FindUserXPath becomes //Employee[UserName/text()='blah' or 1=1 or &lt;br /&gt;
        'a'='a' And Password/text()='blah']&lt;br /&gt;
&lt;br /&gt;
Logically this is equivalent to:&lt;br /&gt;
        //Employee[(UserName/text()='blah' or 1=1) or &lt;br /&gt;
        ('a'='a' And Password/text()='blah')]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this case, only the first part of the XPath needs to be true.  The password part becomes irrelevant, and the UserName part will match ALL employees because of the &amp;quot;1=1&amp;quot; part.&lt;br /&gt;
&lt;br /&gt;
Just like SQL injection, in order to protect yourself you must escape single quotes (or double quotes) if your application uses them.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
VB:&lt;br /&gt;
Dim FindUserXPath as String&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; &amp;amp; Request(&amp;quot;Username&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) &amp;amp; &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; &amp;amp; Request(&amp;quot;Password&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) &amp;amp; &amp;quot;']&amp;quot;&lt;br /&gt;
&lt;br /&gt;
C#:&lt;br /&gt;
String FindUserXPath;&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; + Request(&amp;quot;Username&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) + &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; + Request(&amp;quot;Password&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) + &amp;quot;']&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Another &amp;lt;strong&amp;gt;better&amp;lt;/strong&amp;gt; mitigation option is to use a precompiled XPath[http://www.tkachenko.com/blog/archives/000385.html].  Precompiled XPaths are already preset before the program executes, rather than created on the fly &amp;lt;strong&amp;gt;after&amp;lt;/strong&amp;gt; the user's input has been added to the string.  This is a better route because you don't have to worry about missing a character that should have been escaped.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Injection problem]]&lt;br /&gt;
* [[SQL injection]]&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Injection Attack]]&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=XML_Injection&amp;diff=16613</id>
		<title>XML Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=XML_Injection&amp;diff=16613"/>
				<updated>2007-02-21T08:38:12Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: XML Injection moved to XPATH Injection: XML injection refers to issues where attacker-supplied data is inlined into an XML document.  When user-supplied data is inlined into an XPATH query, it is XPATH injection.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[XPATH Injection]]&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=XPATH_Injection&amp;diff=16612</id>
		<title>XPATH Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=XPATH_Injection&amp;diff=16612"/>
				<updated>2007-02-21T08:38:12Z</updated>
		
		<summary type="html">&lt;p&gt;Erachner: XML Injection moved to XPATH Injection: XML injection refers to issues where attacker-supplied data is inlined into an XML document.  When user-supplied data is inlined into an XPATH query, it is XPATH injection.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Author==&lt;br /&gt;
Contact Author: [mailto:mark.bradshaw@gmail.com Mark Bradshaw]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Similar to SQL Injection, XML Injection attacks occur when a web site uses user supplied information to query XML data.  By sending intentionally malformed information into the web site, an attacker can find out how the XML data is structured or access data that they may not normally have access to.  They may even be able to elevate their privileges on the web site if the xml data is being used for authentication (such as an xml based user file).&lt;br /&gt;
&lt;br /&gt;
Querying XML is done with XPath, a type of simple descriptive statement that allows the xml query to locate a piece of information.  Like SQL you can specify certain attributes to find and patterns to match.  When using XML for a web site it is common to accept some form of input on the query string to identify the content to locate and display on the page.  This input '''must''' be sanitized to verify that it doesn't mess up the XPath query and return the wrong data.&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
We'll use this xml snippet for the examples.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;utf-8&amp;quot;?&amp;amp;gt;&lt;br /&gt;
&amp;amp;lt;Employees&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;Employee ID=&amp;quot;1&amp;quot;&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;FirstName&amp;amp;gt;Arnold&amp;amp;lt;/FirstName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;LastName&amp;amp;gt;Baker&amp;amp;lt;/LastName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;UserName&amp;amp;gt;ABaker&amp;amp;lt;/UserName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Password&amp;amp;gt;SoSecret&amp;amp;lt;/Password&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Type&amp;amp;gt;Admin&amp;amp;lt;/Type&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/Employee&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;Employee ID=&amp;quot;2&amp;quot;&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;FirstName&amp;amp;gt;Peter&amp;amp;lt;/FirstName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;LastName&amp;amp;gt;Pan&amp;amp;lt;/LastName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;UserName&amp;amp;gt;PPan&amp;amp;lt;/UserName&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Password&amp;amp;gt;NotTelling&amp;amp;lt;/Password&amp;amp;gt;&lt;br /&gt;
      &amp;amp;lt;Type&amp;amp;gt;User&amp;amp;lt;/Type&amp;amp;gt;&lt;br /&gt;
   &amp;amp;lt;/Employee&amp;amp;gt;&lt;br /&gt;
&amp;amp;lt;/Employees&amp;amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Suppose we have a user authentication system on a web page that used a data file of this sort to login users.  Once a username and password had been supplied the software might use an XPath to lookup the user such as this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
VB:&lt;br /&gt;
Dim FindUserXPath as String&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; &amp;amp; Request(&amp;quot;Username&amp;quot;) &amp;amp; &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; &amp;amp; Request(&amp;quot;Password&amp;quot;) &amp;amp; &amp;quot;']&amp;quot;&lt;br /&gt;
&lt;br /&gt;
C#:&lt;br /&gt;
String FindUserXPath;&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; + Request(&amp;quot;Username&amp;quot;) + &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; + Request(&amp;quot;Password&amp;quot;) + &amp;quot;']&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
With a normal username and password this XPath would work, but an attacker may send a bad username and password and get an xml node selected without knowing the username or password, like this:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Username: blah' or 1=1 or 'a'='a&lt;br /&gt;
Password: blah&lt;br /&gt;
&lt;br /&gt;
FindUserXPath becomes //Employee[UserName/text()='blah' or 1=1 or &lt;br /&gt;
        'a'='a' And Password/text()='blah']&lt;br /&gt;
&lt;br /&gt;
Logically this is equivalent to:&lt;br /&gt;
        //Employee[(UserName/text()='blah' or 1=1) or &lt;br /&gt;
        ('a'='a' And Password/text()='blah')]&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this case, only the first part of the XPath needs to be true.  The password part becomes irrelevant, and the UserName part will match ALL employees because of the &amp;quot;1=1&amp;quot; part.&lt;br /&gt;
&lt;br /&gt;
Just like SQL injection, in order to protect yourself you must escape single quotes (or double quotes) if your application uses them.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
VB:&lt;br /&gt;
Dim FindUserXPath as String&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; &amp;amp; Request(&amp;quot;Username&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) &amp;amp; &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; &amp;amp; Request(&amp;quot;Password&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) &amp;amp; &amp;quot;']&amp;quot;&lt;br /&gt;
&lt;br /&gt;
C#:&lt;br /&gt;
String FindUserXPath;&lt;br /&gt;
FindUserXPath = &amp;quot;//Employee[UserName/text()='&amp;quot; + Request(&amp;quot;Username&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) + &amp;quot;' And &lt;br /&gt;
        Password/text()='&amp;quot; + Request(&amp;quot;Password&amp;quot;).Replace(&amp;quot;'&amp;quot;, &amp;quot;&amp;amp;apos;&amp;quot;) + &amp;quot;']&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Another &amp;lt;strong&amp;gt;better&amp;lt;/strong&amp;gt; mitigation option is to use a precompiled XPath[http://www.tkachenko.com/blog/archives/000385.html].  Precompiled XPaths are already preset before the program executes, rather than created on the fly &amp;lt;strong&amp;gt;after&amp;lt;/strong&amp;gt; the user's input has been added to the string.  This is a better route because you don't have to worry about missing a character that should have been escaped.&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
* [[Injection problem]]&lt;br /&gt;
* [[SQL injection]]&lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Injection Attack]]&lt;/div&gt;</summary>
		<author><name>Erachner</name></author>	</entry>

	</feed>