<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Favroom</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Favroom"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Favroom"/>
		<updated>2026-05-06T10:10:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2014&amp;diff=184900</id>
		<title>BeNeLux OWASP Day 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2014&amp;diff=184900"/>
				<updated>2014-11-06T21:57:14Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=166178</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=166178"/>
				<updated>2014-01-21T14:24:02Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Other OWASP Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Local News  =&lt;br /&gt;
=='''News'''==&lt;br /&gt;
::; &lt;br /&gt;
::;&lt;br /&gt;
&lt;br /&gt;
=='''Provisional 2014 Chapter Event Calendar'''==&lt;br /&gt;
::*&lt;br /&gt;
::*&lt;br /&gt;
&lt;br /&gt;
::;Slide Decks from past Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands#tab=Past_Events Past Events page].&lt;br /&gt;
&lt;br /&gt;
=='''Other OWASP Events'''==&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/OWASP_Events/upcoming_events OWASP Upcoming Events]'''&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/BeNeLux_OWASP_Day_2014 OWASP benelux 2014]'''&lt;br /&gt;
&lt;br /&gt;
=='''Call for Presentations'''==&lt;br /&gt;
::;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
=='''Stay in contact:'''==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-netherlands]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://www.linkedin.com/groups/OWASP-Netherlands-Chapter-1987229/about]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Sponsors'''==&lt;br /&gt;
::;Our structural Chapter and OWASP Benelux Days 2013 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
== Provisional Chapter Event Calendar 2013 ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Link&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Flyer&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| January 31st, 2013 &lt;br /&gt;
| [[Netherlands January 31, 2013 | Agenda]] &lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 7th, 2013&lt;br /&gt;
| [[Netherlands March 7, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 13th, 2013&lt;br /&gt;
| [[Netherlands March 13, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| April 10th, 2013&lt;br /&gt;
| [[Netherlands April 10, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| May 14, 2013&lt;br /&gt;
| [[Netherlands May 14, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| June 20th, 2013&lt;br /&gt;
| [[EUTour2013_Netherlands_Agenda | The Dutch OWASP European Tour 2013 Event]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-06-20.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| July 31st to August 4th&lt;br /&gt;
| [https://ohm2013.org/wiki/Village:OWASP OWASP Village @ OHM2013]&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| October 31st, 201&lt;br /&gt;
| [[Netherlands October 31, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-10-31.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| November 29th&lt;br /&gt;
| [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
;Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
What do we expect: &lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=166176</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=166176"/>
				<updated>2014-01-21T14:20:33Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Local News  =&lt;br /&gt;
=='''News'''==&lt;br /&gt;
::; &lt;br /&gt;
::;&lt;br /&gt;
&lt;br /&gt;
=='''Provisional 2014 Chapter Event Calendar'''==&lt;br /&gt;
::*&lt;br /&gt;
::*&lt;br /&gt;
&lt;br /&gt;
::;Slide Decks from past Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands#tab=Past_Events Past Events page].&lt;br /&gt;
&lt;br /&gt;
=='''Other OWASP Events'''==&lt;br /&gt;
::;'''OWASP Upcoming Events''': https://www.owasp.org/index.php/OWASP_Events/upcoming_events&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/BeNeLux_OWASP_Day_2014 OWASP benelux 2014]'''&lt;br /&gt;
&lt;br /&gt;
=='''Call for Presentations'''==&lt;br /&gt;
::;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
=='''Stay in contact:'''==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-netherlands]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://www.linkedin.com/groups/OWASP-Netherlands-Chapter-1987229/about]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Sponsors'''==&lt;br /&gt;
::;Our structural Chapter and OWASP Benelux Days 2013 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
== Provisional Chapter Event Calendar 2013 ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Link&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Flyer&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| January 31st, 2013 &lt;br /&gt;
| [[Netherlands January 31, 2013 | Agenda]] &lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 7th, 2013&lt;br /&gt;
| [[Netherlands March 7, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 13th, 2013&lt;br /&gt;
| [[Netherlands March 13, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| April 10th, 2013&lt;br /&gt;
| [[Netherlands April 10, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| May 14, 2013&lt;br /&gt;
| [[Netherlands May 14, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| June 20th, 2013&lt;br /&gt;
| [[EUTour2013_Netherlands_Agenda | The Dutch OWASP European Tour 2013 Event]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-06-20.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| July 31st to August 4th&lt;br /&gt;
| [https://ohm2013.org/wiki/Village:OWASP OWASP Village @ OHM2013]&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| October 31st, 201&lt;br /&gt;
| [[Netherlands October 31, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-10-31.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| November 29th&lt;br /&gt;
| [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
;Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
What do we expect: &lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=166174</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=166174"/>
				<updated>2014-01-21T14:15:34Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Local News  =&lt;br /&gt;
=='''News'''==&lt;br /&gt;
::;[http://www.owaspbenelux.eu OWASP BeNeLux-Day November 29th 2013 RAI Amsterdam] &lt;br /&gt;
::; Registration has been closed we have no tickets left! &amp;lt;strike&amp;gt; Registration opened!&amp;lt;/strike&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Provisional 2014 Chapter Event Calendar'''==&lt;br /&gt;
::*&lt;br /&gt;
::*&lt;br /&gt;
&lt;br /&gt;
::;Slide Decks from past Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands#tab=Past_Events Past Events page].&lt;br /&gt;
&lt;br /&gt;
=='''Other OWASP Events'''==&lt;br /&gt;
::;'''OWASP Upcoming Events''': https://www.owasp.org/index.php/OWASP_Events/upcoming_events&lt;br /&gt;
::;'''[https://www.owasp.org/index.php/BeNeLux_OWASP_Day_2014 OWASP benelux 2014]'''&lt;br /&gt;
&lt;br /&gt;
=='''Call for Presentations'''==&lt;br /&gt;
::;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
=='''Stay in contact:'''==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| cellspacing=&amp;quot;15&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Join the list.png|150px|link=http://lists.owasp.org/mailman/listinfo/owasp-netherlands]] &lt;br /&gt;
| [[Image:Follow-us-on-twitter.png|175px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
| [[Image:Linkedin-button.gif|135px|link=http://www.linkedin.com/groups/OWASP-Netherlands-Chapter-1987229/about]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''Sponsors'''==&lt;br /&gt;
::;Our structural Chapter and OWASP Benelux Days 2013 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
== Provisional Chapter Event Calendar 2013 ==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot;|&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Link&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Flyer&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| January 31st, 2013 &lt;br /&gt;
| [[Netherlands January 31, 2013 | Agenda]] &lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 7th, 2013&lt;br /&gt;
| [[Netherlands March 7, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| March 13th, 2013&lt;br /&gt;
| [[Netherlands March 13, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| April 10th, 2013&lt;br /&gt;
| [[Netherlands April 10, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| May 14, 2013&lt;br /&gt;
| [[Netherlands May 14, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| June 20th, 2013&lt;br /&gt;
| [[EUTour2013_Netherlands_Agenda | The Dutch OWASP European Tour 2013 Event]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-06-20.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| July 31st to August 4th&lt;br /&gt;
| [https://ohm2013.org/wiki/Village:OWASP OWASP Village @ OHM2013]&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| October 31st, 201&lt;br /&gt;
| [[Netherlands October 31, 2013 | Agenda]]&lt;br /&gt;
| [[Media:OWASP Netherlands Chapter Meeting 2013-10-31.pdf | flyer]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| November 29th&lt;br /&gt;
| [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
;Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
What do we expect: &lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=164197</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=164197"/>
				<updated>2013-12-03T16:00:36Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Title, by Dick Berlijn */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the registration is closed, no tickets left!'''&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;!--[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is closed ===&lt;br /&gt;
 Sorry but we already reached the maximum number of pariticipants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2013_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || '''[https://www.owasp.org/images/4/49/OWASP_Update_BeNeLux_2013.pptx OWASP update]'''&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''Keynote: Inside the mind of the fraudster'''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || [[#TomVanGoethem|Tom Van Goethem]] || '''[[Media:RemoteCodeExecutionInWordPress-OWASPBeNeLux-Tom_Van_Goethem.pdf | Remote code execution in WordPress: an analysis]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || [[#AlexiosFakosAndJanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''[[Media:OWASP_BeNeLux-SharePoint-Comprehensive_Security_model_v1.0.pdf | Getting a handle on SharePoint security complexity]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare''' &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MigchieldeJong|Migchiel de Jong]] || ''' [[Media:owasp2013-mdejong.pdf | Static Analysis and code review; A journey through time]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''[[Media:webfingerprinting_owaspBENELUX2013.pdf |Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''[[Media:TraceDroid.pdf | TraceDroid: A Fast and Complete Android Method Tracer]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:RemoteCodeExecutionInWordPress-OWASPBeNeLux-Tom_Van_Goethem.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AlexiosFakosAndJanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:OWASP_BeNeLux-SharePoint-Comprehensive_Security_model_v1.0.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DickBerlijn&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Title, by Dick Berlijn ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=l_XOrcBxy-E Link to the movie on YouTube]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Dick Berlijn'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:owasp2013-mdejong.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Migchiel de Jong''' has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;NickNikiforakis&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:webfingerprinting_owaspBENELUX2013.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JeromeNokin&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:TraceDroid.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Victor van der Veen''' is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=164196</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=164196"/>
				<updated>2013-12-03T15:59:41Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Title, by Dick Berlijn */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the registration is closed, no tickets left!'''&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;!--[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is closed ===&lt;br /&gt;
 Sorry but we already reached the maximum number of pariticipants.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || '''[[Media: OWASP_benelux-day_2013_opening_agenda_closing.pdf | Welcome]]''' &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || '''[https://www.owasp.org/images/4/49/OWASP_Update_BeNeLux_2013.pptx OWASP update]'''&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''Keynote: Inside the mind of the fraudster'''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h30 &lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Morning Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 12h10 || [[#TomVanGoethem|Tom Van Goethem]] || '''[[Media:RemoteCodeExecutionInWordPress-OWASPBeNeLux-Tom_Van_Goethem.pdf | Remote code execution in WordPress: an analysis]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 12h10 - 12h50 || [[#AlexiosFakosAndJanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''[[Media:OWASP_BeNeLux-SharePoint-Comprehensive_Security_model_v1.0.pdf | Getting a handle on SharePoint security complexity]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 12h50 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare''' &lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MigchieldeJong|Migchiel de Jong]] || ''' [[Media:owasp2013-mdejong.pdf | Static Analysis and code review; A journey through time]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''[[Media:webfingerprinting_owaspBENELUX2013.pdf |Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''[[Media:TraceDroid.pdf | TraceDroid: A Fast and Complete Android Method Tracer]]'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:RemoteCodeExecutionInWordPress-OWASPBeNeLux-Tom_Van_Goethem.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AlexiosFakosAndJanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:OWASP_BeNeLux-SharePoint-Comprehensive_Security_model_v1.0.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DickBerlijn&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Title, by Dick Berlijn ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Dick Berlijn'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=l_XOrcBxy-E Link to the movie on YouTube]&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:owasp2013-mdejong.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Migchiel de Jong''' has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;NickNikiforakis&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:webfingerprinting_owaspBENELUX2013.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JeromeNokin&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
::[[Media:TraceDroid.pdf | Download the presentation as PDF]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Victor van der Veen''' is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
[http://www.northwave.nl https://www.owasp.org/images/4/4c/LogoNorthwave.jpg]&lt;br /&gt;
[http://www.cigital.com https://www.owasp.org/images/7/73/AppSecDC2012-Cigital.jpg]&lt;br /&gt;
[[File:Deloitte.jpg||170px|link=http://www.deloitte.com/view/en_NL/nl]]&lt;br /&gt;
[[File:Logo secwatch.jpg||170px|link=http://www.secwatch.nl]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163330</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163330"/>
				<updated>2013-11-15T08:18:09Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || [['''insidethemindofthefraudster|Keynote: Inside the mind of the fraudster''']] &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#TomVanGoethem|Tom Van Goethem]] || '''Remote code exection in WordPress: an analysis''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#JanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''Getting a handle on SharePoint security complexity''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || Migchiel de Jong || ''' Static Analysis and code review; A journey through time, ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''TraceDroid: A Fast and Complete Android Method Tracer'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[insidethemindofthefraudster]]=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Victor van der Veen is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Migchiel de Jong has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
'''More details about the registration for the social event will be online soon!'''&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163329</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163329"/>
				<updated>2013-11-15T08:17:02Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || [['''insidethemindofthefraudster|Keynote: Inside the mind of the fraudster''']] &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#TomVanGoethem|Tom Van Goethem]] || '''Remote code exection in WordPress: an analysis''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#JanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''Getting a handle on SharePoint security complexity''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || Migchiel de Jong || ''' Static Analysis and code review; A journey through time, ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''TraceDroid: A Fast and Complete Android Method Tracer'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Victor van der Veen is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Migchiel de Jong has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
'''More details about the registration for the social event will be online soon!'''&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163328</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163328"/>
				<updated>2013-11-15T08:15:57Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''[[insidethemindofthefraudster|Keynote: Inside the mind of the fraudster]]''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#TomVanGoethem|Tom Van Goethem]] || '''Remote code exection in WordPress: an analysis''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#JanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''Getting a handle on SharePoint security complexity''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || Migchiel de Jong || ''' Static Analysis and code review; A journey through time, ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''TraceDroid: A Fast and Complete Android Method Tracer'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Victor van der Veen is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Migchiel de Jong has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
'''More details about the registration for the social event will be online soon!'''&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163318</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163318"/>
				<updated>2013-11-15T07:55:56Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''Keynote: Inside the mind of the fraudster''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#TomVanGoethem|Tom Van Goethem]] || '''Remote code exection in WordPress: an analysis''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#JanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''Getting a handle on SharePoint security complexity''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Keynote: Cyber warfare''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || Migchiel de Jong || ''' Static Analysis and code review; A journey through time, ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''TraceDroid: A Fast and Complete Android Method Tracer'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Victor van der Veen is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Migchiel de Jong has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
'''More details about the registration for the social event will be online soon!'''&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163317</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163317"/>
				<updated>2013-11-15T07:54:42Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''Keynote: Cybersecurity (Banking)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#TomVanGoethem|Tom Van Goethem]] || '''Remote code exection in WordPress: an analysis''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#JanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''Getting a handle on SharePoint security complexity''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Cyber warfare''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || Migchiel de Jong || ''' Static Analysis and code review; A journey through time, ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''TraceDroid: A Fast and Complete Android Method Tracer'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
When we talk about banking malware, we typically think of bits and bytes: Zeus variants, field injections, Man-in-the-Browser attacks, or forensic analysis of infected PCs. What is actually much more interesting, is to understand what is driving the fraudster. He’s doesn’t care about bits and bytes, he’s just in it for the money. If we get into the mind of the fraudster, we can suddenly understand many issues much better. We’ll see that authentication is irrelevant, fraudsters don’t want to steal millions, that they hate the mobile app, and many more surprising things your never realized were keeping our poor fraudster awake at night.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven University of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Victor van der Veen is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Migchiel de Jong has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
'''More details about the registration for the social event will be online soon!'''&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163314</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=163314"/>
				<updated>2013-11-15T07:52:11Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Key note, by Jan Joris Vereijken (Chief Security Architect, ING) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
* Migchiel de Jong (HP Fortify)&lt;br /&gt;
* Victor van der Veen (ITQ)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Donate]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
'''RAI Amsterdam - Entrance G'''&lt;br /&gt;
;Emerald Room&lt;br /&gt;
;(On the first floor of the Auditorium Centre)&lt;br /&gt;
;Europaplein 2-22&lt;br /&gt;
;1078 Amsterdam, THE NETHERLANDS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking at the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder, OWASP Global || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JanJorisVereijken|Jan Joris Vereijken]] || '''Keynote: Cybersecurity (Banking)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#TomVanGoethem|Tom Van Goethem]] || '''Remote code exection in WordPress: an analysis''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#JanPhilipp|Alexios Fakos &amp;amp; Jan Philipp]] || '''Getting a handle on SharePoint security complexity''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#DickBerlijn|Dick Berlijn]] || '''Cyber warfare''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || Migchiel de Jong || ''' Static Analysis and code review; A journey through time, ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#NickNikiforakis|Nick Nikiforakis]] || '''Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask)''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#JeromeNokin|Jerome Nokin]] || '''Turning your managed Anti-Virus into my botnet''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || [[#VictorvanderVeen|Victor van der Veen]] || '''TraceDroid: A Fast and Complete Android Method Tracer'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanJorisVereijken&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Key note: Inside the mind of the fraudster, by Jan Joris Vereijken (Chief Security Architect, ING) ===&lt;br /&gt;
'''Jan Joris Vereijken''' holds a Ph.D. in Computing Science from the Eindhoven Univerisity of Technology, where he worked on algebraic protocol verification. After a brief stint at Bell Laboratories to work on Software Engineering, he moved to ING, the Dutch banking conglomerate. &amp;lt;br&amp;gt;&lt;br /&gt;
In his current role as Chief Security Architect, he is responsible for the security architecture in the 35-odd countries where ING has banking operations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JeromeNokin&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Turning your managed Anti-Virus into my botnet, by Jerome Nokin (Senior Security Consultant, Verizon Business) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Today centrally managed Anti-Virus (AV) solutions are used across all enterprises and are relied upon to provide central management, logging and enforcement. This talk presents the journey and the results of a reviewing the security posture of the core components of a few selected managed AV solutions, the central servers themselves. &lt;br /&gt;
Critical security vulnerabilities will be presented, covering SQL Injection, Directory Path Traversal and Buffer Overflow.&lt;br /&gt;
Particular focus will be given to the different steps required to analyze both protocols and management functionality and covers reverse-engineering, debugging and the creation of fuzzing tools. Who does not want to transform a major managed AV into his private botnet within minutes?&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jerome Nokin''' works as a Security Consultant for Verizon Enterprise where he is a senior member of the Vulnerability Management Team mainly focusing on Penetration Tests&lt;br /&gt;
and Web Application Assessment. Prior to his role at Verizon he worked in the area of security covering both consultancy and ICT.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Getting a handle on SharePoint security complexity, by Jan Philipp (Solutions Consultant Security, n.runs) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote code exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VictorvanderVeen&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== TraceDroid: A Fast and Complete Android Method Tracer, by Victor van der Veen (Security Consultant, ITQ) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tracedroid allows you to upload any Android APK file (i.e., an Android app) for automated analysis. Tracedroid records the behavior of the executed app, such as its network communication, the UI, but also its internal function calls and Java code that is executed. To trigger the app's real behavior, Tracedroid emulates a few actions, such as user interaction, incoming calls and SMS messages, etc. - this will reveal most malicious intents of an app (if any).&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation, I will outline how Tracedroid is implemented and how its stimulation engine performs in terms of code coverage. I will also demonstrate how Tracedroid's output can help malware researchers to gain a better understanding of unknown Android applications during a live demo.&amp;lt;br&amp;gt;&lt;br /&gt;
You can already give TraceDroid a try via http://tracedroid.few.vu.nl&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Victor van der Veen is a security consultant at ITQ and holds a MSc degree in Computer Science from the VU University Amsterdam. TraceDroid is part of his master thesis titled ‘Dynamic Analysis of Android Malware’ for which he co-worked with the Andrubis team from Vienna’s iSecLab. His interests are low-level system topics that enhance system security, as well as reverse engineering and analyzing malicious code. His previous work involves the implementation of a (partial) thrust-worthy voting machine and an in depth analysis on trends in the field of memory errors (published at RAID 2012).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MigchieldeJong&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Static Analysis and code review; A journey through time, by Migchiel de Jong (Software Security Consultant, HP Fortify) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static analysis techniques to support code review, not just for security, have been around for a long time. This talk will take you on journey from the early days of computer science to this modern day and age of cloud, BYOD and mobile apps and how the passing of time affected code review and the technology to support it. The takeaways from this session are; Understanding the fundamentals problems that have to be addressed to really get the benefits from using static analysis for code review. Trends in code review. Best practices for code review. What the future holds for code review.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Migchiel de Jong has developed hardware and software for the nuclear medicine and nuclear industry space for 10 years before joining Rational Software. During the 5 years at Rational Software (later acquired by IBM) he was involved in many software development process improvement projects. Having joined Fortify 9 years ago, Migchiel de Jong is currently working at HP Fortify, as a software security consultant helping large customers succeed with their software security assurance initiatives.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''You (still) got that swing, and what about the moves ? We've got the Balls!'''&lt;br /&gt;
&lt;br /&gt;
:So &amp;quot;Pin&amp;quot; your schedule to the OWASP Benelux Days - Social Event.&lt;br /&gt;
:Thursday Night the 28th of November, our partner Vest Information Security is happy to invite you at:&lt;br /&gt;
&lt;br /&gt;
:::Knijn Bowling&lt;br /&gt;
:::Scheldeplein 3&lt;br /&gt;
:::1078 GR  Amsterdam&lt;br /&gt;
:::http://www.knijnbowling.nl/&lt;br /&gt;
&lt;br /&gt;
;This is Amsterdams most famous retro-style bowling centre.&lt;br /&gt;
&lt;br /&gt;
:We are very happy to welcome you from 20:30.&lt;br /&gt;
:Our Bowling Tracks are open from 21:30 - 24:00&lt;br /&gt;
&lt;br /&gt;
'''More details about the registration for the social event will be online soon!'''&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''The OWASP BeNeLux-Day 2013 Social Event is sponsored by:&amp;quot;&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
[https://co.clickandpledge.com/?wid=72689 Sponsor] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.securify.nl https://www.owasp.org/images/7/7a/Securify_BV_logo.png]&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
[http://www.nviso.be https://www.owasp.org/images/5/5e/Nviso_logo_RGB_baseline_200px.png]&lt;br /&gt;
[https://informatiebeveiliging.nl/ https://www.owasp.org/images/9/9a/Logo_Informatiebeveiliging-200.png]&lt;br /&gt;
[http://www8.hp.com/us/en/software-solutions/software-security/index.html https://www.owasp.org/images/a/af/HP_Blue_RGB_150_LG-200.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Benelux_2013_Logo.png&amp;diff=160945</id>
		<title>File:OWASP Benelux 2013 Logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Benelux_2013_Logo.png&amp;diff=160945"/>
				<updated>2013-10-16T21:35:45Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: OWASP Benelux 2013 Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Benelux 2013 Logo&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154432</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154432"/>
				<updated>2013-06-25T20:08:33Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Venue is */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:owaspbnl12header.jpg]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conferenceday ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;Br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2013&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not yet open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
''Celestijnenlaan, 200A, fifth floor&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DinisCruz|Advanced O2, by Dinis Cruz &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 04.112]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DanCornell|SDLC with Open Source tools, by Dan Cornell &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.128]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#VolkertDeBuisonje|Secure Java Development with ESAPI (hands-on), by Volkert de Buisonjé &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.152]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#MartinKnobloch|Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.001]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VolkertDeBuisonje&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Secure Java Development workshop with ESAPI, by Volkert de Buisonjé (Sogeti) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
First, attendees will receive a brief introduction on application awareness. Then they will get acquainted with Webgoat, a &amp;quot;deliberately insecure J2EE web application&amp;quot; designed as a practice tool for secure application development and testing. They will learn how to exploit some vulnerabilities in Webgoat, through for instance Cross-Site Scripting (CSS) and Cross-Site Request Forgery (CSRF) attacks. Finally, the ESAPI library will be introduced and the attendees will learn how to apply ESAPI to fix such vulnerabilities in Webgoat's source code.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Prerequisites for this workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
* Reasonable knowledge of and experience with Java development&lt;br /&gt;
* A laptop running a recent version of Linux, Mac OS X, or Windows&lt;br /&gt;
* The most recent version of VirtualBox (4.x) installed&lt;br /&gt;
* At least 2GB of RAM&lt;br /&gt;
* At least 2GB of disk space&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Volkert de Buisonjé is a senior Java developer at Sogeti. He specializes in, and teaches application security courses, both to coworkers and to customers. Knowledge sharing (in both directions) is his passion. Volkert likes making friends and talking a lot. He never shuns a good discussion, and prefers to bring a high amount of interactivity to his classes. :-)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Advanced O2, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Security Consultants Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MartinKnobloch&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch (PervaSec) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling.&lt;br /&gt;
You will be introduced into the security mindset, discus the OWASP TopTen 2010 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;As this is an hands-on workshop, please bring your own laptop!&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Course structure:&lt;br /&gt;
*Introduction OWASP, OWASP tool and documentation&lt;br /&gt;
*Security Testing mindset                &lt;br /&gt;
*1st Lab: OWASP WebGoat / WebScarab                      &lt;br /&gt;
*OWASP Top Ten 2010&lt;br /&gt;
*OWASP Testing Guide                             &lt;br /&gt;
*2nd Lab: OWASP WebGoat / WebScarab              &lt;br /&gt;
*3rd Lab: OWASP Hackademic / ZAP                         &lt;br /&gt;
*Summary and completion  &lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
*Basic understanding of HTTP and web application testing/development&lt;br /&gt;
*An open mind&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Martin is member of the Dutch chapter board and chair of the Global Education Committee and contributes to several projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is a frequent speaker at conferences, universities and hacker spaces.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Building a Software Security Program On Open Source Tools, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of a comprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Outline:''&amp;lt;br&amp;gt;&lt;br /&gt;
* So You Want To Roll Out A Software Security Program?&lt;br /&gt;
* The Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
* ThreadFix: Overview&lt;br /&gt;
* Governance: Strategy and Metrics&lt;br /&gt;
** ThreadFix: Reporting&lt;br /&gt;
* Governance: Policy and Compliance&lt;br /&gt;
* Governance: Education and Guidance&lt;br /&gt;
** OWASP Development Guide&lt;br /&gt;
** OWASP Cheat Sheets&lt;br /&gt;
** OWASP Secure Coding Practices&lt;br /&gt;
* Construction: Threat Assessment&lt;br /&gt;
* Construction: Security Requirements&lt;br /&gt;
* Construction: Secure Architecture&lt;br /&gt;
** ESAPI overview&lt;br /&gt;
** Microsoft Web Protection Library (Anti-XSS) overview&lt;br /&gt;
* Verification: Design Review&lt;br /&gt;
** Microsoft Threat Analysis and Modeling Tool&lt;br /&gt;
* Verification: Code Review&lt;br /&gt;
** FindBugs&lt;br /&gt;
** FxCop&lt;br /&gt;
** CAT.NET&lt;br /&gt;
** Brakeman&lt;br /&gt;
** Agnitio&lt;br /&gt;
* Verification: Security Testing&lt;br /&gt;
** Arachni&lt;br /&gt;
** w3af&lt;br /&gt;
** ZAProxy&lt;br /&gt;
* Deployment: Vulnerability Management&lt;br /&gt;
** ThreadFix: Defect Tracker Integration&lt;br /&gt;
* Deployment: Environment Hardening&lt;br /&gt;
** Microsoft Baseline Security Analyzer (MBSA)&lt;br /&gt;
* Deployment: Operational Enablement&lt;br /&gt;
** mod_security&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 30th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The conference takes place in auditorium K.06, the registration and catering in the foyer of building 200A (ground floor)  (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome ([https://www.owasp.org/images/a/ad/OWASP_BeNeLux_Day_2012_-_Organization_welcome.ppt PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder || OWASP update ([https://www.owasp.org/images/d/d7/OWASP-Update-BeNeLux-Day-2012_v1.pptx PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JohnWilander|John Wilander]] || ''' Secure Web Integration Patterns in the Era of HTML5'''&amp;lt;br&amp;gt;''Abstract:'' Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#LievenDesmet|Lieven Desmet]] || '''Sandboxing Javascript''' ([https://www.owasp.org/images/1/10/Sandboxing-Javascript.pdf PDF])&amp;lt;br&amp;gt;''Abstract:'' The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts.&amp;lt;br&amp;gt;&lt;br /&gt;
Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#ErwinGeirnaert|Erwin Geirnaert]] || '''OWASP Top 10 vs Drupal'''&amp;lt;br&amp;gt;''Abstract:'' Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#AsiaSlowinska|Asia Slowinska]] || '''Body Armor for Binaries'''&amp;lt;br&amp;gt;''Abstract:'' BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MarcHullegieAndKeesMastwijk|Marc Hullegie and Kees Mastwijk]] || '''Forensics'''&amp;lt;br&amp;gt;''Abstract:'' In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#DanCornell|Dan Cornell]] || '''Streamlining Application Vulnerability Management: Communication Between Development and Security Teams'''&amp;lt;br&amp;gt;''Abstract:'' Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || [[#RuedigerBachmann|Ruediger Bachmann]] || '''Code review for Large Companies'''&amp;lt;br&amp;gt;''Abstract:''Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#DinisCruz|Dinis Cruz]] || '''Making Security Invisible by Becoming the Developer’s Best Friends'''&amp;lt;br&amp;gt;''Abstract:'' Coming soon!&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || &lt;br /&gt;
* Steven Wierckx&lt;br /&gt;
* Luc Beirens&lt;br /&gt;
* Jos Dumortier&lt;br /&gt;
* Dieter Sarrazyn&lt;br /&gt;
* Erwin Geirnaert&lt;br /&gt;
* John Wilander&lt;br /&gt;
|| '''Panel Discussion about the legal aspects of penetration testing'''&amp;lt;br&amp;gt; ''Abstract:'' In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2012 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AsiaSlowinska&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;RuedigerBachmann&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;LievenDesmet&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;ErwinGeirnaert&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MarcHullegieAndKeesMastwijk&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) === &lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2012 with you.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JohnWilander&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Coming soon!''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Panel discussion about the legal aspects of penetration testing ===&lt;br /&gt;
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt; In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Steven Wierckx, ps_testware:''&amp;lt;br&amp;gt;&lt;br /&gt;
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Luc Beirens, FCCU:''&amp;lt;br&amp;gt;&lt;br /&gt;
Head of Belgian Federal Computer Crime Unit &amp;amp; Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Jos Dumortier, ICRI:''&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R &amp;amp; D projects in the domain of telemedicine.&amp;lt;br&amp;gt;&lt;br /&gt;
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).&amp;lt;br&amp;gt;&lt;br /&gt;
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. &amp;lt;br&amp;gt;&lt;br /&gt;
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Dieter Sarrazyn, PWC:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks &amp;amp; tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 29th ====&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Important Update&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The brewery visit is limit to 60 people. Therefor, the 60 first registered people that indicated interest in the social event have been invited to participate. Any remaining tickets will be offered on Thursday around noon at the registration desk.&lt;br /&gt;
&lt;br /&gt;
If you are going by car, there are paid parkings under the Railway station and at Kinepolis (follow the parking signs). If you want to go there from the venue without car, the best way to get there is to take bus No.2 that leaves next to the building and drives to the Railway station. From there, it is a 300 m. walk to the brewery.&lt;br /&gt;
&lt;br /&gt;
All other people (and the people of the brewery tour after that has finished) are warmly invited to join us in the Downtown Jack, a pub with a number of pool and snooker tables. 5 pool tables have been exclusively reserved for us from 20h00 onwards. You can also have a drink and eat something there if you like.&lt;br /&gt;
&lt;br /&gt;
The address: Parkstraat 40, 3000 Leuven (see http://www.downtownjack.be/)&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Brewery Visit Information&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The social event will take place at the InBev Brewery in Leuven, where there will be a guided tour and a beer tasting.&amp;lt;br&amp;gt;&lt;br /&gt;
Unfortunately, the tour is limited to 60 people. Since we have more registered people than places, we will soon announce how we will&lt;br /&gt;
proceed.&amp;lt;br&amp;gt;&lt;br /&gt;
If you decide not to join, please inform the Benelux organisation, other participants will be happy to join.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The entrance fee for the tour is 10 EUR'''. &amp;lt;br&amp;gt;&lt;br /&gt;
This amount will have to be paid to the Benelux organisation at the registration desk or upon entry in cash (please use correct notes).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Below is the address where the event takes place. You can take your car, bus number 2 or a taxi to reach this.&amp;lt;br&amp;gt; '''The tour starts at 19h30 sharp'''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Address:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Vuurkruisenlaan z/n &amp;lt;br&amp;gt;&lt;br /&gt;
3000 Leuven&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''From the station:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Take the street 'Diestepoort' (this street is parrallel with the railway behind the building)and walk straight through. You can see the brewery at the end of the street.&amp;lt;br&amp;gt;&lt;br /&gt;
'''By car:'''&amp;lt;br&amp;gt;&lt;br /&gt;
From the street diestesteenweg or beckeremieplein head to the railroadbridge. At the crossroad take first right, this is the entrance of the brewery. from the expressway R23 head to the Hotel ''NOVOTEL''. Take the street left from ''NOVOTEL'', this is the ''vuurkruisenlaan''. On your left side you can see the brewery. At the&lt;br /&gt;
next crossroad take the first left, this is the entrance of the brewery.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''ENTRANCE BREWERY:'''&amp;lt;br&amp;gt;&lt;br /&gt;
is also the entrance for the trucks, next to the railroadbridge.&amp;lt;br&amp;gt;&lt;br /&gt;
We will meet at the entrance at 19h30 where the tour will start.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2012 and participate in the Capture the Flag event November 30th 2012.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2012!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 29th and 30th of November, 2012.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hosted and co-organized by: ====&lt;br /&gt;
 &lt;br /&gt;
[http://distrinet.cs.kuleuven.be https://www.owasp.org/images/4/4a/Logo_distrinet.png]&lt;br /&gt;
[http://www.nessos-project.eu/ https://www.owasp.org/images/5/52/Nessos.png]&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
==== OWASP Member Sponsor: ====&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}} &lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux 2013 Sponsors: ====&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154431</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154431"/>
				<updated>2013-06-25T20:07:15Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Registration is open: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:owaspbnl12header.jpg]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conferenceday ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;Br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2013&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not yet open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is the iMinds-DistriNet Research Group @ KU Leuven ===&lt;br /&gt;
&lt;br /&gt;
''Celestijnenlaan, 200A&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: http://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
Board house (close to the venue)&amp;lt;br&amp;gt; http://www.boardhouse.be&amp;lt;br&amp;gt;&lt;br /&gt;
The lodge (close to the venue)&amp;lt;br&amp;gt; http://www.booking.com/hotel/be/the-lodge-heverlee.en.html&amp;lt;br&amp;gt;&lt;br /&gt;
Begijnhof Congres Hotel (1 km from the venue)&amp;lt;br&amp;gt; http://www.bchotel.be/&amp;lt;br&amp;gt;&lt;br /&gt;
La Royale (2 km from the venue)&amp;lt;br&amp;gt; http://www.laroyale.be&amp;lt;br&amp;gt; &lt;br /&gt;
Hotel Ibis (2 km from the venue)&amp;lt;br&amp;gt; http://www.accorhotels.com/gb/hotel-1457-ibis-leuven-centrum/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
Mercure (2 km from the venue) &amp;lt;br&amp;gt; http://www.mercure.com/gb/hotel-7862-hotel-mercure-leuven-center/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
New Damshire (2 km from the venue)&amp;lt;br&amp;gt; http://www.hotelnewdamshire.be&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
''Celestijnenlaan, 200A, fifth floor&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DinisCruz|Advanced O2, by Dinis Cruz &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 04.112]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DanCornell|SDLC with Open Source tools, by Dan Cornell &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.128]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#VolkertDeBuisonje|Secure Java Development with ESAPI (hands-on), by Volkert de Buisonjé &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.152]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#MartinKnobloch|Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.001]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VolkertDeBuisonje&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Secure Java Development workshop with ESAPI, by Volkert de Buisonjé (Sogeti) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
First, attendees will receive a brief introduction on application awareness. Then they will get acquainted with Webgoat, a &amp;quot;deliberately insecure J2EE web application&amp;quot; designed as a practice tool for secure application development and testing. They will learn how to exploit some vulnerabilities in Webgoat, through for instance Cross-Site Scripting (CSS) and Cross-Site Request Forgery (CSRF) attacks. Finally, the ESAPI library will be introduced and the attendees will learn how to apply ESAPI to fix such vulnerabilities in Webgoat's source code.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Prerequisites for this workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
* Reasonable knowledge of and experience with Java development&lt;br /&gt;
* A laptop running a recent version of Linux, Mac OS X, or Windows&lt;br /&gt;
* The most recent version of VirtualBox (4.x) installed&lt;br /&gt;
* At least 2GB of RAM&lt;br /&gt;
* At least 2GB of disk space&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Volkert de Buisonjé is a senior Java developer at Sogeti. He specializes in, and teaches application security courses, both to coworkers and to customers. Knowledge sharing (in both directions) is his passion. Volkert likes making friends and talking a lot. He never shuns a good discussion, and prefers to bring a high amount of interactivity to his classes. :-)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Advanced O2, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Security Consultants Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MartinKnobloch&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch (PervaSec) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling.&lt;br /&gt;
You will be introduced into the security mindset, discus the OWASP TopTen 2010 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;As this is an hands-on workshop, please bring your own laptop!&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Course structure:&lt;br /&gt;
*Introduction OWASP, OWASP tool and documentation&lt;br /&gt;
*Security Testing mindset                &lt;br /&gt;
*1st Lab: OWASP WebGoat / WebScarab                      &lt;br /&gt;
*OWASP Top Ten 2010&lt;br /&gt;
*OWASP Testing Guide                             &lt;br /&gt;
*2nd Lab: OWASP WebGoat / WebScarab              &lt;br /&gt;
*3rd Lab: OWASP Hackademic / ZAP                         &lt;br /&gt;
*Summary and completion  &lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
*Basic understanding of HTTP and web application testing/development&lt;br /&gt;
*An open mind&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Martin is member of the Dutch chapter board and chair of the Global Education Committee and contributes to several projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is a frequent speaker at conferences, universities and hacker spaces.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Building a Software Security Program On Open Source Tools, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of a comprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Outline:''&amp;lt;br&amp;gt;&lt;br /&gt;
* So You Want To Roll Out A Software Security Program?&lt;br /&gt;
* The Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
* ThreadFix: Overview&lt;br /&gt;
* Governance: Strategy and Metrics&lt;br /&gt;
** ThreadFix: Reporting&lt;br /&gt;
* Governance: Policy and Compliance&lt;br /&gt;
* Governance: Education and Guidance&lt;br /&gt;
** OWASP Development Guide&lt;br /&gt;
** OWASP Cheat Sheets&lt;br /&gt;
** OWASP Secure Coding Practices&lt;br /&gt;
* Construction: Threat Assessment&lt;br /&gt;
* Construction: Security Requirements&lt;br /&gt;
* Construction: Secure Architecture&lt;br /&gt;
** ESAPI overview&lt;br /&gt;
** Microsoft Web Protection Library (Anti-XSS) overview&lt;br /&gt;
* Verification: Design Review&lt;br /&gt;
** Microsoft Threat Analysis and Modeling Tool&lt;br /&gt;
* Verification: Code Review&lt;br /&gt;
** FindBugs&lt;br /&gt;
** FxCop&lt;br /&gt;
** CAT.NET&lt;br /&gt;
** Brakeman&lt;br /&gt;
** Agnitio&lt;br /&gt;
* Verification: Security Testing&lt;br /&gt;
** Arachni&lt;br /&gt;
** w3af&lt;br /&gt;
** ZAProxy&lt;br /&gt;
* Deployment: Vulnerability Management&lt;br /&gt;
** ThreadFix: Defect Tracker Integration&lt;br /&gt;
* Deployment: Environment Hardening&lt;br /&gt;
** Microsoft Baseline Security Analyzer (MBSA)&lt;br /&gt;
* Deployment: Operational Enablement&lt;br /&gt;
** mod_security&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 30th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The conference takes place in auditorium K.06, the registration and catering in the foyer of building 200A (ground floor)  (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome ([https://www.owasp.org/images/a/ad/OWASP_BeNeLux_Day_2012_-_Organization_welcome.ppt PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder || OWASP update ([https://www.owasp.org/images/d/d7/OWASP-Update-BeNeLux-Day-2012_v1.pptx PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JohnWilander|John Wilander]] || ''' Secure Web Integration Patterns in the Era of HTML5'''&amp;lt;br&amp;gt;''Abstract:'' Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#LievenDesmet|Lieven Desmet]] || '''Sandboxing Javascript''' ([https://www.owasp.org/images/1/10/Sandboxing-Javascript.pdf PDF])&amp;lt;br&amp;gt;''Abstract:'' The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts.&amp;lt;br&amp;gt;&lt;br /&gt;
Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#ErwinGeirnaert|Erwin Geirnaert]] || '''OWASP Top 10 vs Drupal'''&amp;lt;br&amp;gt;''Abstract:'' Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#AsiaSlowinska|Asia Slowinska]] || '''Body Armor for Binaries'''&amp;lt;br&amp;gt;''Abstract:'' BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MarcHullegieAndKeesMastwijk|Marc Hullegie and Kees Mastwijk]] || '''Forensics'''&amp;lt;br&amp;gt;''Abstract:'' In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#DanCornell|Dan Cornell]] || '''Streamlining Application Vulnerability Management: Communication Between Development and Security Teams'''&amp;lt;br&amp;gt;''Abstract:'' Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || [[#RuedigerBachmann|Ruediger Bachmann]] || '''Code review for Large Companies'''&amp;lt;br&amp;gt;''Abstract:''Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#DinisCruz|Dinis Cruz]] || '''Making Security Invisible by Becoming the Developer’s Best Friends'''&amp;lt;br&amp;gt;''Abstract:'' Coming soon!&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || &lt;br /&gt;
* Steven Wierckx&lt;br /&gt;
* Luc Beirens&lt;br /&gt;
* Jos Dumortier&lt;br /&gt;
* Dieter Sarrazyn&lt;br /&gt;
* Erwin Geirnaert&lt;br /&gt;
* John Wilander&lt;br /&gt;
|| '''Panel Discussion about the legal aspects of penetration testing'''&amp;lt;br&amp;gt; ''Abstract:'' In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2012 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AsiaSlowinska&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;RuedigerBachmann&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;LievenDesmet&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;ErwinGeirnaert&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MarcHullegieAndKeesMastwijk&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) === &lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2012 with you.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JohnWilander&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Coming soon!''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Panel discussion about the legal aspects of penetration testing ===&lt;br /&gt;
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt; In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Steven Wierckx, ps_testware:''&amp;lt;br&amp;gt;&lt;br /&gt;
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Luc Beirens, FCCU:''&amp;lt;br&amp;gt;&lt;br /&gt;
Head of Belgian Federal Computer Crime Unit &amp;amp; Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Jos Dumortier, ICRI:''&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R &amp;amp; D projects in the domain of telemedicine.&amp;lt;br&amp;gt;&lt;br /&gt;
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).&amp;lt;br&amp;gt;&lt;br /&gt;
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. &amp;lt;br&amp;gt;&lt;br /&gt;
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Dieter Sarrazyn, PWC:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks &amp;amp; tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 29th ====&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Important Update&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The brewery visit is limit to 60 people. Therefor, the 60 first registered people that indicated interest in the social event have been invited to participate. Any remaining tickets will be offered on Thursday around noon at the registration desk.&lt;br /&gt;
&lt;br /&gt;
If you are going by car, there are paid parkings under the Railway station and at Kinepolis (follow the parking signs). If you want to go there from the venue without car, the best way to get there is to take bus No.2 that leaves next to the building and drives to the Railway station. From there, it is a 300 m. walk to the brewery.&lt;br /&gt;
&lt;br /&gt;
All other people (and the people of the brewery tour after that has finished) are warmly invited to join us in the Downtown Jack, a pub with a number of pool and snooker tables. 5 pool tables have been exclusively reserved for us from 20h00 onwards. You can also have a drink and eat something there if you like.&lt;br /&gt;
&lt;br /&gt;
The address: Parkstraat 40, 3000 Leuven (see http://www.downtownjack.be/)&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Brewery Visit Information&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The social event will take place at the InBev Brewery in Leuven, where there will be a guided tour and a beer tasting.&amp;lt;br&amp;gt;&lt;br /&gt;
Unfortunately, the tour is limited to 60 people. Since we have more registered people than places, we will soon announce how we will&lt;br /&gt;
proceed.&amp;lt;br&amp;gt;&lt;br /&gt;
If you decide not to join, please inform the Benelux organisation, other participants will be happy to join.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The entrance fee for the tour is 10 EUR'''. &amp;lt;br&amp;gt;&lt;br /&gt;
This amount will have to be paid to the Benelux organisation at the registration desk or upon entry in cash (please use correct notes).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Below is the address where the event takes place. You can take your car, bus number 2 or a taxi to reach this.&amp;lt;br&amp;gt; '''The tour starts at 19h30 sharp'''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Address:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Vuurkruisenlaan z/n &amp;lt;br&amp;gt;&lt;br /&gt;
3000 Leuven&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''From the station:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Take the street 'Diestepoort' (this street is parrallel with the railway behind the building)and walk straight through. You can see the brewery at the end of the street.&amp;lt;br&amp;gt;&lt;br /&gt;
'''By car:'''&amp;lt;br&amp;gt;&lt;br /&gt;
From the street diestesteenweg or beckeremieplein head to the railroadbridge. At the crossroad take first right, this is the entrance of the brewery. from the expressway R23 head to the Hotel ''NOVOTEL''. Take the street left from ''NOVOTEL'', this is the ''vuurkruisenlaan''. On your left side you can see the brewery. At the&lt;br /&gt;
next crossroad take the first left, this is the entrance of the brewery.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''ENTRANCE BREWERY:'''&amp;lt;br&amp;gt;&lt;br /&gt;
is also the entrance for the trucks, next to the railroadbridge.&amp;lt;br&amp;gt;&lt;br /&gt;
We will meet at the entrance at 19h30 where the tour will start.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2012 and participate in the Capture the Flag event November 30th 2012.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2012!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 29th and 30th of November, 2012.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hosted and co-organized by: ====&lt;br /&gt;
 &lt;br /&gt;
[http://distrinet.cs.kuleuven.be https://www.owasp.org/images/4/4a/Logo_distrinet.png]&lt;br /&gt;
[http://www.nessos-project.eu/ https://www.owasp.org/images/5/52/Nessos.png]&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
==== OWASP Member Sponsor: ====&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}} &lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux 2013 Sponsors: ====&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154430</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154430"/>
				<updated>2013-06-25T20:04:50Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* OWASP BeNeLux 2012 Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:owaspbnl12header.jpg]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conferenceday ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;Br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2013&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2012.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is the iMinds-DistriNet Research Group @ KU Leuven ===&lt;br /&gt;
&lt;br /&gt;
''Celestijnenlaan, 200A&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: http://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
Board house (close to the venue)&amp;lt;br&amp;gt; http://www.boardhouse.be&amp;lt;br&amp;gt;&lt;br /&gt;
The lodge (close to the venue)&amp;lt;br&amp;gt; http://www.booking.com/hotel/be/the-lodge-heverlee.en.html&amp;lt;br&amp;gt;&lt;br /&gt;
Begijnhof Congres Hotel (1 km from the venue)&amp;lt;br&amp;gt; http://www.bchotel.be/&amp;lt;br&amp;gt;&lt;br /&gt;
La Royale (2 km from the venue)&amp;lt;br&amp;gt; http://www.laroyale.be&amp;lt;br&amp;gt; &lt;br /&gt;
Hotel Ibis (2 km from the venue)&amp;lt;br&amp;gt; http://www.accorhotels.com/gb/hotel-1457-ibis-leuven-centrum/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
Mercure (2 km from the venue) &amp;lt;br&amp;gt; http://www.mercure.com/gb/hotel-7862-hotel-mercure-leuven-center/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
New Damshire (2 km from the venue)&amp;lt;br&amp;gt; http://www.hotelnewdamshire.be&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
''Celestijnenlaan, 200A, fifth floor&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DinisCruz|Advanced O2, by Dinis Cruz &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 04.112]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DanCornell|SDLC with Open Source tools, by Dan Cornell &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.128]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#VolkertDeBuisonje|Secure Java Development with ESAPI (hands-on), by Volkert de Buisonjé &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.152]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#MartinKnobloch|Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.001]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VolkertDeBuisonje&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Secure Java Development workshop with ESAPI, by Volkert de Buisonjé (Sogeti) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
First, attendees will receive a brief introduction on application awareness. Then they will get acquainted with Webgoat, a &amp;quot;deliberately insecure J2EE web application&amp;quot; designed as a practice tool for secure application development and testing. They will learn how to exploit some vulnerabilities in Webgoat, through for instance Cross-Site Scripting (CSS) and Cross-Site Request Forgery (CSRF) attacks. Finally, the ESAPI library will be introduced and the attendees will learn how to apply ESAPI to fix such vulnerabilities in Webgoat's source code.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Prerequisites for this workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
* Reasonable knowledge of and experience with Java development&lt;br /&gt;
* A laptop running a recent version of Linux, Mac OS X, or Windows&lt;br /&gt;
* The most recent version of VirtualBox (4.x) installed&lt;br /&gt;
* At least 2GB of RAM&lt;br /&gt;
* At least 2GB of disk space&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Volkert de Buisonjé is a senior Java developer at Sogeti. He specializes in, and teaches application security courses, both to coworkers and to customers. Knowledge sharing (in both directions) is his passion. Volkert likes making friends and talking a lot. He never shuns a good discussion, and prefers to bring a high amount of interactivity to his classes. :-)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Advanced O2, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Security Consultants Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MartinKnobloch&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch (PervaSec) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling.&lt;br /&gt;
You will be introduced into the security mindset, discus the OWASP TopTen 2010 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;As this is an hands-on workshop, please bring your own laptop!&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Course structure:&lt;br /&gt;
*Introduction OWASP, OWASP tool and documentation&lt;br /&gt;
*Security Testing mindset                &lt;br /&gt;
*1st Lab: OWASP WebGoat / WebScarab                      &lt;br /&gt;
*OWASP Top Ten 2010&lt;br /&gt;
*OWASP Testing Guide                             &lt;br /&gt;
*2nd Lab: OWASP WebGoat / WebScarab              &lt;br /&gt;
*3rd Lab: OWASP Hackademic / ZAP                         &lt;br /&gt;
*Summary and completion  &lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
*Basic understanding of HTTP and web application testing/development&lt;br /&gt;
*An open mind&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Martin is member of the Dutch chapter board and chair of the Global Education Committee and contributes to several projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is a frequent speaker at conferences, universities and hacker spaces.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Building a Software Security Program On Open Source Tools, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of a comprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Outline:''&amp;lt;br&amp;gt;&lt;br /&gt;
* So You Want To Roll Out A Software Security Program?&lt;br /&gt;
* The Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
* ThreadFix: Overview&lt;br /&gt;
* Governance: Strategy and Metrics&lt;br /&gt;
** ThreadFix: Reporting&lt;br /&gt;
* Governance: Policy and Compliance&lt;br /&gt;
* Governance: Education and Guidance&lt;br /&gt;
** OWASP Development Guide&lt;br /&gt;
** OWASP Cheat Sheets&lt;br /&gt;
** OWASP Secure Coding Practices&lt;br /&gt;
* Construction: Threat Assessment&lt;br /&gt;
* Construction: Security Requirements&lt;br /&gt;
* Construction: Secure Architecture&lt;br /&gt;
** ESAPI overview&lt;br /&gt;
** Microsoft Web Protection Library (Anti-XSS) overview&lt;br /&gt;
* Verification: Design Review&lt;br /&gt;
** Microsoft Threat Analysis and Modeling Tool&lt;br /&gt;
* Verification: Code Review&lt;br /&gt;
** FindBugs&lt;br /&gt;
** FxCop&lt;br /&gt;
** CAT.NET&lt;br /&gt;
** Brakeman&lt;br /&gt;
** Agnitio&lt;br /&gt;
* Verification: Security Testing&lt;br /&gt;
** Arachni&lt;br /&gt;
** w3af&lt;br /&gt;
** ZAProxy&lt;br /&gt;
* Deployment: Vulnerability Management&lt;br /&gt;
** ThreadFix: Defect Tracker Integration&lt;br /&gt;
* Deployment: Environment Hardening&lt;br /&gt;
** Microsoft Baseline Security Analyzer (MBSA)&lt;br /&gt;
* Deployment: Operational Enablement&lt;br /&gt;
** mod_security&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 30th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The conference takes place in auditorium K.06, the registration and catering in the foyer of building 200A (ground floor)  (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome ([https://www.owasp.org/images/a/ad/OWASP_BeNeLux_Day_2012_-_Organization_welcome.ppt PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder || OWASP update ([https://www.owasp.org/images/d/d7/OWASP-Update-BeNeLux-Day-2012_v1.pptx PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JohnWilander|John Wilander]] || ''' Secure Web Integration Patterns in the Era of HTML5'''&amp;lt;br&amp;gt;''Abstract:'' Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#LievenDesmet|Lieven Desmet]] || '''Sandboxing Javascript''' ([https://www.owasp.org/images/1/10/Sandboxing-Javascript.pdf PDF])&amp;lt;br&amp;gt;''Abstract:'' The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts.&amp;lt;br&amp;gt;&lt;br /&gt;
Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#ErwinGeirnaert|Erwin Geirnaert]] || '''OWASP Top 10 vs Drupal'''&amp;lt;br&amp;gt;''Abstract:'' Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#AsiaSlowinska|Asia Slowinska]] || '''Body Armor for Binaries'''&amp;lt;br&amp;gt;''Abstract:'' BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MarcHullegieAndKeesMastwijk|Marc Hullegie and Kees Mastwijk]] || '''Forensics'''&amp;lt;br&amp;gt;''Abstract:'' In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#DanCornell|Dan Cornell]] || '''Streamlining Application Vulnerability Management: Communication Between Development and Security Teams'''&amp;lt;br&amp;gt;''Abstract:'' Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || [[#RuedigerBachmann|Ruediger Bachmann]] || '''Code review for Large Companies'''&amp;lt;br&amp;gt;''Abstract:''Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#DinisCruz|Dinis Cruz]] || '''Making Security Invisible by Becoming the Developer’s Best Friends'''&amp;lt;br&amp;gt;''Abstract:'' Coming soon!&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || &lt;br /&gt;
* Steven Wierckx&lt;br /&gt;
* Luc Beirens&lt;br /&gt;
* Jos Dumortier&lt;br /&gt;
* Dieter Sarrazyn&lt;br /&gt;
* Erwin Geirnaert&lt;br /&gt;
* John Wilander&lt;br /&gt;
|| '''Panel Discussion about the legal aspects of penetration testing'''&amp;lt;br&amp;gt; ''Abstract:'' In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2012 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AsiaSlowinska&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;RuedigerBachmann&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;LievenDesmet&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;ErwinGeirnaert&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MarcHullegieAndKeesMastwijk&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) === &lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2012 with you.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JohnWilander&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Coming soon!''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Panel discussion about the legal aspects of penetration testing ===&lt;br /&gt;
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt; In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Steven Wierckx, ps_testware:''&amp;lt;br&amp;gt;&lt;br /&gt;
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Luc Beirens, FCCU:''&amp;lt;br&amp;gt;&lt;br /&gt;
Head of Belgian Federal Computer Crime Unit &amp;amp; Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Jos Dumortier, ICRI:''&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R &amp;amp; D projects in the domain of telemedicine.&amp;lt;br&amp;gt;&lt;br /&gt;
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).&amp;lt;br&amp;gt;&lt;br /&gt;
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. &amp;lt;br&amp;gt;&lt;br /&gt;
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Dieter Sarrazyn, PWC:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks &amp;amp; tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 29th ====&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Important Update&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The brewery visit is limit to 60 people. Therefor, the 60 first registered people that indicated interest in the social event have been invited to participate. Any remaining tickets will be offered on Thursday around noon at the registration desk.&lt;br /&gt;
&lt;br /&gt;
If you are going by car, there are paid parkings under the Railway station and at Kinepolis (follow the parking signs). If you want to go there from the venue without car, the best way to get there is to take bus No.2 that leaves next to the building and drives to the Railway station. From there, it is a 300 m. walk to the brewery.&lt;br /&gt;
&lt;br /&gt;
All other people (and the people of the brewery tour after that has finished) are warmly invited to join us in the Downtown Jack, a pub with a number of pool and snooker tables. 5 pool tables have been exclusively reserved for us from 20h00 onwards. You can also have a drink and eat something there if you like.&lt;br /&gt;
&lt;br /&gt;
The address: Parkstraat 40, 3000 Leuven (see http://www.downtownjack.be/)&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Brewery Visit Information&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The social event will take place at the InBev Brewery in Leuven, where there will be a guided tour and a beer tasting.&amp;lt;br&amp;gt;&lt;br /&gt;
Unfortunately, the tour is limited to 60 people. Since we have more registered people than places, we will soon announce how we will&lt;br /&gt;
proceed.&amp;lt;br&amp;gt;&lt;br /&gt;
If you decide not to join, please inform the Benelux organisation, other participants will be happy to join.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The entrance fee for the tour is 10 EUR'''. &amp;lt;br&amp;gt;&lt;br /&gt;
This amount will have to be paid to the Benelux organisation at the registration desk or upon entry in cash (please use correct notes).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Below is the address where the event takes place. You can take your car, bus number 2 or a taxi to reach this.&amp;lt;br&amp;gt; '''The tour starts at 19h30 sharp'''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Address:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Vuurkruisenlaan z/n &amp;lt;br&amp;gt;&lt;br /&gt;
3000 Leuven&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''From the station:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Take the street 'Diestepoort' (this street is parrallel with the railway behind the building)and walk straight through. You can see the brewery at the end of the street.&amp;lt;br&amp;gt;&lt;br /&gt;
'''By car:'''&amp;lt;br&amp;gt;&lt;br /&gt;
From the street diestesteenweg or beckeremieplein head to the railroadbridge. At the crossroad take first right, this is the entrance of the brewery. from the expressway R23 head to the Hotel ''NOVOTEL''. Take the street left from ''NOVOTEL'', this is the ''vuurkruisenlaan''. On your left side you can see the brewery. At the&lt;br /&gt;
next crossroad take the first left, this is the entrance of the brewery.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''ENTRANCE BREWERY:'''&amp;lt;br&amp;gt;&lt;br /&gt;
is also the entrance for the trucks, next to the railroadbridge.&amp;lt;br&amp;gt;&lt;br /&gt;
We will meet at the entrance at 19h30 where the tour will start.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2012 and participate in the Capture the Flag event November 30th 2012.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2012!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 29th and 30th of November, 2012.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hosted and co-organized by: ====&lt;br /&gt;
 &lt;br /&gt;
[http://distrinet.cs.kuleuven.be https://www.owasp.org/images/4/4a/Logo_distrinet.png]&lt;br /&gt;
[http://www.nessos-project.eu/ https://www.owasp.org/images/5/52/Nessos.png]&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
==== OWASP Member Sponsor: ====&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}} &lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux 2013 Sponsors: ====&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154429</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154429"/>
				<updated>2013-06-25T20:03:27Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Tweet! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:owaspbnl12header.jpg]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conferenceday ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;Br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2013&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2012.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is the iMinds-DistriNet Research Group @ KU Leuven ===&lt;br /&gt;
&lt;br /&gt;
''Celestijnenlaan, 200A&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: http://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
Board house (close to the venue)&amp;lt;br&amp;gt; http://www.boardhouse.be&amp;lt;br&amp;gt;&lt;br /&gt;
The lodge (close to the venue)&amp;lt;br&amp;gt; http://www.booking.com/hotel/be/the-lodge-heverlee.en.html&amp;lt;br&amp;gt;&lt;br /&gt;
Begijnhof Congres Hotel (1 km from the venue)&amp;lt;br&amp;gt; http://www.bchotel.be/&amp;lt;br&amp;gt;&lt;br /&gt;
La Royale (2 km from the venue)&amp;lt;br&amp;gt; http://www.laroyale.be&amp;lt;br&amp;gt; &lt;br /&gt;
Hotel Ibis (2 km from the venue)&amp;lt;br&amp;gt; http://www.accorhotels.com/gb/hotel-1457-ibis-leuven-centrum/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
Mercure (2 km from the venue) &amp;lt;br&amp;gt; http://www.mercure.com/gb/hotel-7862-hotel-mercure-leuven-center/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
New Damshire (2 km from the venue)&amp;lt;br&amp;gt; http://www.hotelnewdamshire.be&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
''Celestijnenlaan, 200A, fifth floor&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DinisCruz|Advanced O2, by Dinis Cruz &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 04.112]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DanCornell|SDLC with Open Source tools, by Dan Cornell &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.128]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#VolkertDeBuisonje|Secure Java Development with ESAPI (hands-on), by Volkert de Buisonjé &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.152]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#MartinKnobloch|Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.001]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VolkertDeBuisonje&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Secure Java Development workshop with ESAPI, by Volkert de Buisonjé (Sogeti) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
First, attendees will receive a brief introduction on application awareness. Then they will get acquainted with Webgoat, a &amp;quot;deliberately insecure J2EE web application&amp;quot; designed as a practice tool for secure application development and testing. They will learn how to exploit some vulnerabilities in Webgoat, through for instance Cross-Site Scripting (CSS) and Cross-Site Request Forgery (CSRF) attacks. Finally, the ESAPI library will be introduced and the attendees will learn how to apply ESAPI to fix such vulnerabilities in Webgoat's source code.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Prerequisites for this workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
* Reasonable knowledge of and experience with Java development&lt;br /&gt;
* A laptop running a recent version of Linux, Mac OS X, or Windows&lt;br /&gt;
* The most recent version of VirtualBox (4.x) installed&lt;br /&gt;
* At least 2GB of RAM&lt;br /&gt;
* At least 2GB of disk space&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Volkert de Buisonjé is a senior Java developer at Sogeti. He specializes in, and teaches application security courses, both to coworkers and to customers. Knowledge sharing (in both directions) is his passion. Volkert likes making friends and talking a lot. He never shuns a good discussion, and prefers to bring a high amount of interactivity to his classes. :-)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Advanced O2, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Security Consultants Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MartinKnobloch&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch (PervaSec) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling.&lt;br /&gt;
You will be introduced into the security mindset, discus the OWASP TopTen 2010 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;As this is an hands-on workshop, please bring your own laptop!&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Course structure:&lt;br /&gt;
*Introduction OWASP, OWASP tool and documentation&lt;br /&gt;
*Security Testing mindset                &lt;br /&gt;
*1st Lab: OWASP WebGoat / WebScarab                      &lt;br /&gt;
*OWASP Top Ten 2010&lt;br /&gt;
*OWASP Testing Guide                             &lt;br /&gt;
*2nd Lab: OWASP WebGoat / WebScarab              &lt;br /&gt;
*3rd Lab: OWASP Hackademic / ZAP                         &lt;br /&gt;
*Summary and completion  &lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
*Basic understanding of HTTP and web application testing/development&lt;br /&gt;
*An open mind&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Martin is member of the Dutch chapter board and chair of the Global Education Committee and contributes to several projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is a frequent speaker at conferences, universities and hacker spaces.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Building a Software Security Program On Open Source Tools, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of a comprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Outline:''&amp;lt;br&amp;gt;&lt;br /&gt;
* So You Want To Roll Out A Software Security Program?&lt;br /&gt;
* The Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
* ThreadFix: Overview&lt;br /&gt;
* Governance: Strategy and Metrics&lt;br /&gt;
** ThreadFix: Reporting&lt;br /&gt;
* Governance: Policy and Compliance&lt;br /&gt;
* Governance: Education and Guidance&lt;br /&gt;
** OWASP Development Guide&lt;br /&gt;
** OWASP Cheat Sheets&lt;br /&gt;
** OWASP Secure Coding Practices&lt;br /&gt;
* Construction: Threat Assessment&lt;br /&gt;
* Construction: Security Requirements&lt;br /&gt;
* Construction: Secure Architecture&lt;br /&gt;
** ESAPI overview&lt;br /&gt;
** Microsoft Web Protection Library (Anti-XSS) overview&lt;br /&gt;
* Verification: Design Review&lt;br /&gt;
** Microsoft Threat Analysis and Modeling Tool&lt;br /&gt;
* Verification: Code Review&lt;br /&gt;
** FindBugs&lt;br /&gt;
** FxCop&lt;br /&gt;
** CAT.NET&lt;br /&gt;
** Brakeman&lt;br /&gt;
** Agnitio&lt;br /&gt;
* Verification: Security Testing&lt;br /&gt;
** Arachni&lt;br /&gt;
** w3af&lt;br /&gt;
** ZAProxy&lt;br /&gt;
* Deployment: Vulnerability Management&lt;br /&gt;
** ThreadFix: Defect Tracker Integration&lt;br /&gt;
* Deployment: Environment Hardening&lt;br /&gt;
** Microsoft Baseline Security Analyzer (MBSA)&lt;br /&gt;
* Deployment: Operational Enablement&lt;br /&gt;
** mod_security&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 30th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The conference takes place in auditorium K.06, the registration and catering in the foyer of building 200A (ground floor)  (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome ([https://www.owasp.org/images/a/ad/OWASP_BeNeLux_Day_2012_-_Organization_welcome.ppt PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder || OWASP update ([https://www.owasp.org/images/d/d7/OWASP-Update-BeNeLux-Day-2012_v1.pptx PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JohnWilander|John Wilander]] || ''' Secure Web Integration Patterns in the Era of HTML5'''&amp;lt;br&amp;gt;''Abstract:'' Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#LievenDesmet|Lieven Desmet]] || '''Sandboxing Javascript''' ([https://www.owasp.org/images/1/10/Sandboxing-Javascript.pdf PDF])&amp;lt;br&amp;gt;''Abstract:'' The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts.&amp;lt;br&amp;gt;&lt;br /&gt;
Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#ErwinGeirnaert|Erwin Geirnaert]] || '''OWASP Top 10 vs Drupal'''&amp;lt;br&amp;gt;''Abstract:'' Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#AsiaSlowinska|Asia Slowinska]] || '''Body Armor for Binaries'''&amp;lt;br&amp;gt;''Abstract:'' BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MarcHullegieAndKeesMastwijk|Marc Hullegie and Kees Mastwijk]] || '''Forensics'''&amp;lt;br&amp;gt;''Abstract:'' In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#DanCornell|Dan Cornell]] || '''Streamlining Application Vulnerability Management: Communication Between Development and Security Teams'''&amp;lt;br&amp;gt;''Abstract:'' Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || [[#RuedigerBachmann|Ruediger Bachmann]] || '''Code review for Large Companies'''&amp;lt;br&amp;gt;''Abstract:''Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#DinisCruz|Dinis Cruz]] || '''Making Security Invisible by Becoming the Developer’s Best Friends'''&amp;lt;br&amp;gt;''Abstract:'' Coming soon!&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || &lt;br /&gt;
* Steven Wierckx&lt;br /&gt;
* Luc Beirens&lt;br /&gt;
* Jos Dumortier&lt;br /&gt;
* Dieter Sarrazyn&lt;br /&gt;
* Erwin Geirnaert&lt;br /&gt;
* John Wilander&lt;br /&gt;
|| '''Panel Discussion about the legal aspects of penetration testing'''&amp;lt;br&amp;gt; ''Abstract:'' In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2012 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AsiaSlowinska&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;RuedigerBachmann&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;LievenDesmet&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;ErwinGeirnaert&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MarcHullegieAndKeesMastwijk&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) === &lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2012 with you.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JohnWilander&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Coming soon!''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Panel discussion about the legal aspects of penetration testing ===&lt;br /&gt;
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt; In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Steven Wierckx, ps_testware:''&amp;lt;br&amp;gt;&lt;br /&gt;
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Luc Beirens, FCCU:''&amp;lt;br&amp;gt;&lt;br /&gt;
Head of Belgian Federal Computer Crime Unit &amp;amp; Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Jos Dumortier, ICRI:''&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R &amp;amp; D projects in the domain of telemedicine.&amp;lt;br&amp;gt;&lt;br /&gt;
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).&amp;lt;br&amp;gt;&lt;br /&gt;
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. &amp;lt;br&amp;gt;&lt;br /&gt;
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Dieter Sarrazyn, PWC:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks &amp;amp; tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 29th ====&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Important Update&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The brewery visit is limit to 60 people. Therefor, the 60 first registered people that indicated interest in the social event have been invited to participate. Any remaining tickets will be offered on Thursday around noon at the registration desk.&lt;br /&gt;
&lt;br /&gt;
If you are going by car, there are paid parkings under the Railway station and at Kinepolis (follow the parking signs). If you want to go there from the venue without car, the best way to get there is to take bus No.2 that leaves next to the building and drives to the Railway station. From there, it is a 300 m. walk to the brewery.&lt;br /&gt;
&lt;br /&gt;
All other people (and the people of the brewery tour after that has finished) are warmly invited to join us in the Downtown Jack, a pub with a number of pool and snooker tables. 5 pool tables have been exclusively reserved for us from 20h00 onwards. You can also have a drink and eat something there if you like.&lt;br /&gt;
&lt;br /&gt;
The address: Parkstraat 40, 3000 Leuven (see http://www.downtownjack.be/)&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Brewery Visit Information&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The social event will take place at the InBev Brewery in Leuven, where there will be a guided tour and a beer tasting.&amp;lt;br&amp;gt;&lt;br /&gt;
Unfortunately, the tour is limited to 60 people. Since we have more registered people than places, we will soon announce how we will&lt;br /&gt;
proceed.&amp;lt;br&amp;gt;&lt;br /&gt;
If you decide not to join, please inform the Benelux organisation, other participants will be happy to join.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The entrance fee for the tour is 10 EUR'''. &amp;lt;br&amp;gt;&lt;br /&gt;
This amount will have to be paid to the Benelux organisation at the registration desk or upon entry in cash (please use correct notes).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Below is the address where the event takes place. You can take your car, bus number 2 or a taxi to reach this.&amp;lt;br&amp;gt; '''The tour starts at 19h30 sharp'''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Address:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Vuurkruisenlaan z/n &amp;lt;br&amp;gt;&lt;br /&gt;
3000 Leuven&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''From the station:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Take the street 'Diestepoort' (this street is parrallel with the railway behind the building)and walk straight through. You can see the brewery at the end of the street.&amp;lt;br&amp;gt;&lt;br /&gt;
'''By car:'''&amp;lt;br&amp;gt;&lt;br /&gt;
From the street diestesteenweg or beckeremieplein head to the railroadbridge. At the crossroad take first right, this is the entrance of the brewery. from the expressway R23 head to the Hotel ''NOVOTEL''. Take the street left from ''NOVOTEL'', this is the ''vuurkruisenlaan''. On your left side you can see the brewery. At the&lt;br /&gt;
next crossroad take the first left, this is the entrance of the brewery.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''ENTRANCE BREWERY:'''&amp;lt;br&amp;gt;&lt;br /&gt;
is also the entrance for the trucks, next to the railroadbridge.&amp;lt;br&amp;gt;&lt;br /&gt;
We will meet at the entrance at 19h30 where the tour will start.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2012 and participate in the Capture the Flag event November 30th 2012.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2012!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 29th and 30th of November, 2012.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hosted and co-organized by: ====&lt;br /&gt;
 &lt;br /&gt;
[http://distrinet.cs.kuleuven.be https://www.owasp.org/images/4/4a/Logo_distrinet.png]&lt;br /&gt;
[http://www.nessos-project.eu/ https://www.owasp.org/images/5/52/Nessos.png]&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
==== OWASP Member Sponsor: ====&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}} &lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux 2012 Sponsors: ====&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154428</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=154428"/>
				<updated>2013-06-25T20:02:58Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Welcome to OWASP BeNeLux 2013 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:owaspbnl12header.jpg]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conferenceday ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
* &amp;lt;Br&amp;gt;&lt;br /&gt;
* &amp;lt;br&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl12 #owaspbnl12]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2012.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is the iMinds-DistriNet Research Group @ KU Leuven ===&lt;br /&gt;
&lt;br /&gt;
''Celestijnenlaan, 200A&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: http://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
Board house (close to the venue)&amp;lt;br&amp;gt; http://www.boardhouse.be&amp;lt;br&amp;gt;&lt;br /&gt;
The lodge (close to the venue)&amp;lt;br&amp;gt; http://www.booking.com/hotel/be/the-lodge-heverlee.en.html&amp;lt;br&amp;gt;&lt;br /&gt;
Begijnhof Congres Hotel (1 km from the venue)&amp;lt;br&amp;gt; http://www.bchotel.be/&amp;lt;br&amp;gt;&lt;br /&gt;
La Royale (2 km from the venue)&amp;lt;br&amp;gt; http://www.laroyale.be&amp;lt;br&amp;gt; &lt;br /&gt;
Hotel Ibis (2 km from the venue)&amp;lt;br&amp;gt; http://www.accorhotels.com/gb/hotel-1457-ibis-leuven-centrum/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
Mercure (2 km from the venue) &amp;lt;br&amp;gt; http://www.mercure.com/gb/hotel-7862-hotel-mercure-leuven-center/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
New Damshire (2 km from the venue)&amp;lt;br&amp;gt; http://www.hotelnewdamshire.be&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
''Celestijnenlaan, 200A, fifth floor&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DinisCruz|Advanced O2, by Dinis Cruz &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 04.112]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DanCornell|SDLC with Open Source tools, by Dan Cornell &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.128]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#VolkertDeBuisonje|Secure Java Development with ESAPI (hands-on), by Volkert de Buisonjé &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.152]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#MartinKnobloch|Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.001]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VolkertDeBuisonje&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Secure Java Development workshop with ESAPI, by Volkert de Buisonjé (Sogeti) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
First, attendees will receive a brief introduction on application awareness. Then they will get acquainted with Webgoat, a &amp;quot;deliberately insecure J2EE web application&amp;quot; designed as a practice tool for secure application development and testing. They will learn how to exploit some vulnerabilities in Webgoat, through for instance Cross-Site Scripting (CSS) and Cross-Site Request Forgery (CSRF) attacks. Finally, the ESAPI library will be introduced and the attendees will learn how to apply ESAPI to fix such vulnerabilities in Webgoat's source code.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Prerequisites for this workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
* Reasonable knowledge of and experience with Java development&lt;br /&gt;
* A laptop running a recent version of Linux, Mac OS X, or Windows&lt;br /&gt;
* The most recent version of VirtualBox (4.x) installed&lt;br /&gt;
* At least 2GB of RAM&lt;br /&gt;
* At least 2GB of disk space&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Volkert de Buisonjé is a senior Java developer at Sogeti. He specializes in, and teaches application security courses, both to coworkers and to customers. Knowledge sharing (in both directions) is his passion. Volkert likes making friends and talking a lot. He never shuns a good discussion, and prefers to bring a high amount of interactivity to his classes. :-)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Advanced O2, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Security Consultants Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MartinKnobloch&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch (PervaSec) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling.&lt;br /&gt;
You will be introduced into the security mindset, discus the OWASP TopTen 2010 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;As this is an hands-on workshop, please bring your own laptop!&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Course structure:&lt;br /&gt;
*Introduction OWASP, OWASP tool and documentation&lt;br /&gt;
*Security Testing mindset                &lt;br /&gt;
*1st Lab: OWASP WebGoat / WebScarab                      &lt;br /&gt;
*OWASP Top Ten 2010&lt;br /&gt;
*OWASP Testing Guide                             &lt;br /&gt;
*2nd Lab: OWASP WebGoat / WebScarab              &lt;br /&gt;
*3rd Lab: OWASP Hackademic / ZAP                         &lt;br /&gt;
*Summary and completion  &lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
*Basic understanding of HTTP and web application testing/development&lt;br /&gt;
*An open mind&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Martin is member of the Dutch chapter board and chair of the Global Education Committee and contributes to several projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is a frequent speaker at conferences, universities and hacker spaces.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Building a Software Security Program On Open Source Tools, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of a comprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Outline:''&amp;lt;br&amp;gt;&lt;br /&gt;
* So You Want To Roll Out A Software Security Program?&lt;br /&gt;
* The Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
* ThreadFix: Overview&lt;br /&gt;
* Governance: Strategy and Metrics&lt;br /&gt;
** ThreadFix: Reporting&lt;br /&gt;
* Governance: Policy and Compliance&lt;br /&gt;
* Governance: Education and Guidance&lt;br /&gt;
** OWASP Development Guide&lt;br /&gt;
** OWASP Cheat Sheets&lt;br /&gt;
** OWASP Secure Coding Practices&lt;br /&gt;
* Construction: Threat Assessment&lt;br /&gt;
* Construction: Security Requirements&lt;br /&gt;
* Construction: Secure Architecture&lt;br /&gt;
** ESAPI overview&lt;br /&gt;
** Microsoft Web Protection Library (Anti-XSS) overview&lt;br /&gt;
* Verification: Design Review&lt;br /&gt;
** Microsoft Threat Analysis and Modeling Tool&lt;br /&gt;
* Verification: Code Review&lt;br /&gt;
** FindBugs&lt;br /&gt;
** FxCop&lt;br /&gt;
** CAT.NET&lt;br /&gt;
** Brakeman&lt;br /&gt;
** Agnitio&lt;br /&gt;
* Verification: Security Testing&lt;br /&gt;
** Arachni&lt;br /&gt;
** w3af&lt;br /&gt;
** ZAProxy&lt;br /&gt;
* Deployment: Vulnerability Management&lt;br /&gt;
** ThreadFix: Defect Tracker Integration&lt;br /&gt;
* Deployment: Environment Hardening&lt;br /&gt;
** Microsoft Baseline Security Analyzer (MBSA)&lt;br /&gt;
* Deployment: Operational Enablement&lt;br /&gt;
** mod_security&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 30th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The conference takes place in auditorium K.06, the registration and catering in the foyer of building 200A (ground floor)  (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome ([https://www.owasp.org/images/a/ad/OWASP_BeNeLux_Day_2012_-_Organization_welcome.ppt PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder || OWASP update ([https://www.owasp.org/images/d/d7/OWASP-Update-BeNeLux-Day-2012_v1.pptx PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JohnWilander|John Wilander]] || ''' Secure Web Integration Patterns in the Era of HTML5'''&amp;lt;br&amp;gt;''Abstract:'' Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#LievenDesmet|Lieven Desmet]] || '''Sandboxing Javascript''' ([https://www.owasp.org/images/1/10/Sandboxing-Javascript.pdf PDF])&amp;lt;br&amp;gt;''Abstract:'' The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts.&amp;lt;br&amp;gt;&lt;br /&gt;
Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#ErwinGeirnaert|Erwin Geirnaert]] || '''OWASP Top 10 vs Drupal'''&amp;lt;br&amp;gt;''Abstract:'' Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#AsiaSlowinska|Asia Slowinska]] || '''Body Armor for Binaries'''&amp;lt;br&amp;gt;''Abstract:'' BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MarcHullegieAndKeesMastwijk|Marc Hullegie and Kees Mastwijk]] || '''Forensics'''&amp;lt;br&amp;gt;''Abstract:'' In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#DanCornell|Dan Cornell]] || '''Streamlining Application Vulnerability Management: Communication Between Development and Security Teams'''&amp;lt;br&amp;gt;''Abstract:'' Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || [[#RuedigerBachmann|Ruediger Bachmann]] || '''Code review for Large Companies'''&amp;lt;br&amp;gt;''Abstract:''Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#DinisCruz|Dinis Cruz]] || '''Making Security Invisible by Becoming the Developer’s Best Friends'''&amp;lt;br&amp;gt;''Abstract:'' Coming soon!&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || &lt;br /&gt;
* Steven Wierckx&lt;br /&gt;
* Luc Beirens&lt;br /&gt;
* Jos Dumortier&lt;br /&gt;
* Dieter Sarrazyn&lt;br /&gt;
* Erwin Geirnaert&lt;br /&gt;
* John Wilander&lt;br /&gt;
|| '''Panel Discussion about the legal aspects of penetration testing'''&amp;lt;br&amp;gt; ''Abstract:'' In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2012 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AsiaSlowinska&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;RuedigerBachmann&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;LievenDesmet&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;ErwinGeirnaert&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MarcHullegieAndKeesMastwijk&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) === &lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2012 with you.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JohnWilander&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Coming soon!''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Panel discussion about the legal aspects of penetration testing ===&lt;br /&gt;
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt; In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Steven Wierckx, ps_testware:''&amp;lt;br&amp;gt;&lt;br /&gt;
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Luc Beirens, FCCU:''&amp;lt;br&amp;gt;&lt;br /&gt;
Head of Belgian Federal Computer Crime Unit &amp;amp; Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Jos Dumortier, ICRI:''&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R &amp;amp; D projects in the domain of telemedicine.&amp;lt;br&amp;gt;&lt;br /&gt;
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).&amp;lt;br&amp;gt;&lt;br /&gt;
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. &amp;lt;br&amp;gt;&lt;br /&gt;
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Dieter Sarrazyn, PWC:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks &amp;amp; tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 29th ====&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Important Update&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The brewery visit is limit to 60 people. Therefor, the 60 first registered people that indicated interest in the social event have been invited to participate. Any remaining tickets will be offered on Thursday around noon at the registration desk.&lt;br /&gt;
&lt;br /&gt;
If you are going by car, there are paid parkings under the Railway station and at Kinepolis (follow the parking signs). If you want to go there from the venue without car, the best way to get there is to take bus No.2 that leaves next to the building and drives to the Railway station. From there, it is a 300 m. walk to the brewery.&lt;br /&gt;
&lt;br /&gt;
All other people (and the people of the brewery tour after that has finished) are warmly invited to join us in the Downtown Jack, a pub with a number of pool and snooker tables. 5 pool tables have been exclusively reserved for us from 20h00 onwards. You can also have a drink and eat something there if you like.&lt;br /&gt;
&lt;br /&gt;
The address: Parkstraat 40, 3000 Leuven (see http://www.downtownjack.be/)&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Brewery Visit Information&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The social event will take place at the InBev Brewery in Leuven, where there will be a guided tour and a beer tasting.&amp;lt;br&amp;gt;&lt;br /&gt;
Unfortunately, the tour is limited to 60 people. Since we have more registered people than places, we will soon announce how we will&lt;br /&gt;
proceed.&amp;lt;br&amp;gt;&lt;br /&gt;
If you decide not to join, please inform the Benelux organisation, other participants will be happy to join.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The entrance fee for the tour is 10 EUR'''. &amp;lt;br&amp;gt;&lt;br /&gt;
This amount will have to be paid to the Benelux organisation at the registration desk or upon entry in cash (please use correct notes).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Below is the address where the event takes place. You can take your car, bus number 2 or a taxi to reach this.&amp;lt;br&amp;gt; '''The tour starts at 19h30 sharp'''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Address:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Vuurkruisenlaan z/n &amp;lt;br&amp;gt;&lt;br /&gt;
3000 Leuven&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''From the station:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Take the street 'Diestepoort' (this street is parrallel with the railway behind the building)and walk straight through. You can see the brewery at the end of the street.&amp;lt;br&amp;gt;&lt;br /&gt;
'''By car:'''&amp;lt;br&amp;gt;&lt;br /&gt;
From the street diestesteenweg or beckeremieplein head to the railroadbridge. At the crossroad take first right, this is the entrance of the brewery. from the expressway R23 head to the Hotel ''NOVOTEL''. Take the street left from ''NOVOTEL'', this is the ''vuurkruisenlaan''. On your left side you can see the brewery. At the&lt;br /&gt;
next crossroad take the first left, this is the entrance of the brewery.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''ENTRANCE BREWERY:'''&amp;lt;br&amp;gt;&lt;br /&gt;
is also the entrance for the trucks, next to the railroadbridge.&amp;lt;br&amp;gt;&lt;br /&gt;
We will meet at the entrance at 19h30 where the tour will start.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2012 and participate in the Capture the Flag event November 30th 2012.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2012!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 29th and 30th of November, 2012.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hosted and co-organized by: ====&lt;br /&gt;
 &lt;br /&gt;
[http://distrinet.cs.kuleuven.be https://www.owasp.org/images/4/4a/Logo_distrinet.png]&lt;br /&gt;
[http://www.nessos-project.eu/ https://www.owasp.org/images/5/52/Nessos.png]&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
==== OWASP Member Sponsor: ====&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}} &lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux 2012 Sponsors: ====&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=151137</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=151137"/>
				<updated>2013-05-07T19:47:56Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;Registration to our next OWASP Netherlands Chapter meeting is now open!&lt;br /&gt;
&lt;br /&gt;
;Slide Decks from recent Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands_Previous_Events_2013 Past Events page].&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*[[Netherlands May 14, 2013]] &amp;lt;b&amp;gt;[http://goo.gl/hajk2 Please register here]&amp;lt;/b&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 7th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 13th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; April 10th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; May 14, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2012&lt;br /&gt;
*November 28th and 29th, 2013 [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149898</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149898"/>
				<updated>2013-04-15T19:22:34Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;Registration to our next OWASP Netherlands Chapter meeting is now open!&lt;br /&gt;
[http://goo.gl/hajk2 Please register here]&lt;br /&gt;
[https://www.owasp.org/index.php/Netherlands_May_14,_2013 The Program can be found here]&lt;br /&gt;
&lt;br /&gt;
;Slide Decks from recent Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands_Previous_Events_2013 Past Events page].&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 7th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 13th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; April 10th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2012&lt;br /&gt;
*November 28th and 29th, 2013 [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149896</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149896"/>
				<updated>2013-04-15T19:21:06Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;Registration to our next OWASP Netherlands Chapter meeting is now open!&lt;br /&gt;
[http://goo.gl/hajk2 Please register here]&lt;br /&gt;
&lt;br /&gt;
;Slide Decks from recent Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands_Previous_Events_2013 Past Events page].&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 7th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 13th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; April 10th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2012&lt;br /&gt;
*November 28th and 29th, 2013 [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149886</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149886"/>
				<updated>2013-04-15T18:37:42Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting you will learn how to protect your password storage and how to take down bots in a peer to peer network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  Securing Password Storage - Tiago Teles&lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  Neutralizing Peer-to-Peer Botnets - Dennis Andriesse&lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;br /&gt;
&lt;br /&gt;
==Sponsor==&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149885</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149885"/>
				<updated>2013-04-15T18:32:54Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting you will learn how to protect your password storage and how to take down bots in a peer to peer network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;br /&gt;
&lt;br /&gt;
==Sponsor==&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149881</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149881"/>
				<updated>2013-04-15T18:04:51Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: /* Sponsor */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting you will learn how to protect your password storage and how to take down bots in a peer to peer network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;br /&gt;
&lt;br /&gt;
==Sponsor==&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149880</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149880"/>
				<updated>2013-04-15T18:01:39Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting you will learn how to protect your password storage and how to take down bots in a peer to peer network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;br /&gt;
&lt;br /&gt;
==Sponsor==&lt;br /&gt;
[[[http://statischecontent.nl/img/etalage/92fd2d94-5328-4966-9ab5-5152d783ac12.jpg]]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149879</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149879"/>
				<updated>2013-04-15T17:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting you will learn how to protect your password storage and how to take down bots in a peer to peer network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;br /&gt;
&lt;br /&gt;
==Sponsor==&lt;br /&gt;
[[File:Avans.jpg]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149878</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149878"/>
				<updated>2013-04-15T17:41:36Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting you will learn how to protect your password storage and how to take down bots in a peer to peer network&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149877</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149877"/>
				<updated>2013-04-15T17:38:12Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse.&lt;br /&gt;
&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles.&lt;br /&gt;
&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149876</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149876"/>
				<updated>2013-04-15T17:37:42Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Dennis Andriesse&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Tiago Teles&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149875</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149875"/>
				<updated>2013-04-15T17:36:16Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Tiago Teles&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Dennis Andriesse&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149874</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149874"/>
				<updated>2013-04-15T17:31:00Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
By Tiago Teles&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
By Dennis Andriesse&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets. Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149873</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149873"/>
				<updated>2013-04-15T17:27:01Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets. Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149869</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149869"/>
				<updated>2013-04-15T15:52:13Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Discovering flaws using JS-Enabled crawlers===&lt;br /&gt;
Automated testing of security faults on a web page is common practice these days. However, most modern web application aren't a set of pages anymore. They load their content dynamically using AJAX and tailor the results to the user's needs using JavaScript. Running the automated tools on these applications is much harder, if not impossible. Using Crawljax, a JavaScript enabled Crawler, testing all pages and states of such web applications becomes possible again. In this presentation, I will give an overview of the possibilities Crawljax offers.&lt;br /&gt;
&lt;br /&gt;
===Securing Password Storage - Increasing Resistance to Brute Force Attacks===&lt;br /&gt;
In this talk Tiago Teles takes apart password protection scheme analyzing the attack&lt;br /&gt;
resistance of hashes, hmacs, adaptive hashes (such as script), and encryption&lt;br /&gt;
schemes. First, we present a threat model for password storage. Then audience&lt;br /&gt;
members will learn the construction, performance, and protective properties of these&lt;br /&gt;
primitives. Discussion of the primitives will be from a critical perspective modeled as&lt;br /&gt;
an iterative secure design session.&lt;br /&gt;
Ultimately, this session presents the solution and code donated as part of the on-&lt;br /&gt;
going OWASP PSM (password storage module) project. Discussion of this solution&lt;br /&gt;
will include key techniques for hardening PSM learned through years of delivering&lt;br /&gt;
production JavaEE code to customers...&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
===Alex Nederlof===&lt;br /&gt;
Alex Nederlof is a Msc student in Compute Science, Software Engineering. Active in web application development for 4 years at E.Novation BTC. Now working on Crawljax, a JavaScript-enabled Crawler.&lt;br /&gt;
===Tiago Teles===&lt;br /&gt;
Tiago Teles is a Technical Consultant with 7 years of experience in clients across&lt;br /&gt;
different sectors and countries, including banking, insurance, telecommunications&lt;br /&gt;
and commercial organizations in a variety of roles, Development, Business&lt;br /&gt;
Intelligence, Quality Assurance and Delivering Training.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149868</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149868"/>
				<updated>2013-04-15T15:45:42Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===Discovering flaws using JS-Enabled crawlers===&lt;br /&gt;
Automated testing of security faults on a web page is common practice these days. However, most modern web application aren't a set of pages anymore. They load their content dynamically using AJAX and tailor the results to the user's needs using JavaScript. Running the automated tools on these applications is much harder, if not impossible. Using Crawljax, a JavaScript enabled Crawler, testing all pages and states of such web applications becomes possible again. In this presentation, I will give an overview of the possibilities Crawljax offers.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
===Alex Nederlof===&lt;br /&gt;
Alex Nederlof is a Msc student in Compute Science, Software Engineering. Active in web application development for 4 years at E.Novation BTC. Now working on Crawljax, a JavaScript-enabled Crawler.&lt;br /&gt;
&lt;br /&gt;
==Venue==&lt;br /&gt;
Avans Hogeschool&lt;br /&gt;
Room: OB007&lt;br /&gt;
Onderwijsboulevard 215&lt;br /&gt;
5223 DE 's-Hertogenbosch&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149866</id>
		<title>Netherlands May 14, 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_May_14,_2013&amp;diff=149866"/>
				<updated>2013-04-15T14:32:42Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: Created page with &amp;quot;= May 14, 2013 = &amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;  ==Programme== :18:30 - 19:15  R...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= May 14, 2013 =&lt;br /&gt;
&amp;quot;In this Chapter meeting we will not REST until we have designed an access control mechanism to protect your web services...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Programme==&lt;br /&gt;
:18:30 - 19:15  Registration &amp;amp; Pizza&lt;br /&gt;
:19:15 - 20:00  &lt;br /&gt;
:20:00 - 20:15  Break&lt;br /&gt;
:20:15 - 21:00  &lt;br /&gt;
:21:00 - 21:30  Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Neutralizing Peer-to-Peer Botnets===&lt;br /&gt;
This presentation is a case study on our takedown efforts against state-of-the-art peer-to-peer botnets.&lt;br /&gt;
Unlike conventional botnets, peer-to-peer botnets are decentralized, and thus cannot be disabled by neutralizing centralized control facilities. Takedowns against peer-to-peer botnets require a highly decentralized approach targeting the infected drones themselves. We describe the technical and ethical challenges we faced in our own takedown attempts.&lt;br /&gt;
&lt;br /&gt;
===x===&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Dennis Andriesse===&lt;br /&gt;
Dennis Andriesse is a Ph.D. candidate in the System and Network Security Group at VU University Amsterdam. His research focuses on binary code (de)obfuscation and reverse engineering techniques. Next to that, he is also interested in advanced malware, particularly in the resilience of peer-to-peer botnets.&lt;br /&gt;
===x===&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Previous_Events_2013&amp;diff=149865</id>
		<title>Netherlands Previous Events 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Previous_Events_2013&amp;diff=149865"/>
				<updated>2013-04-15T14:24:27Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] events held in 2013&lt;br /&gt;
;[[Netherlands May 14, 2013]]&lt;br /&gt;
*[[Netherlands_May_14,_2013#]]&lt;br /&gt;
*[[Netherlands_May_14,_2013#]]&lt;br /&gt;
;[[Netherlands April 10, 2013]]&lt;br /&gt;
*[[Netherlands_April_10,_2013#Access_Control_Design_Best_Practices|Access Control Design Best Practices - Jim Manico]] - ([[Media:Owaspnl-jimmanico-toptendefensesv8.pdf‎ | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_April_10,_2013#RESTful_web_services.2C_the_web_security_blind_spot|RESTful web services, the web security blind spot - Ofer Shezaf]] - ([[Media:Owaspnl-oferschezaf-securitytestingforrestapplicationsv6april2013.pdf | Download the presentation as PDF]])&lt;br /&gt;
;[[Netherlands March 13, 2013]]&lt;br /&gt;
*[[Netherlands_March_13,_2013#Record_It.21|Record It - Colin Watson]] - ([[Media:Owaspnl-colinwatson-recordit.pdf | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_March_13,_2013#The_smartphone_penetration_testing_framework|The smartphone penetration testing framework - Georgia Weidman]] - ([[Media:The_smartphone_penetration_testing_framework-Georgia_Weidman.pdf | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_March_13,_2013#OWASP_Cornucopia|OWASP Cornucopia - Colin Watson]] - ([[Media:Owaspnl-colinwatson-cornucopia.pdf | Download the presentation as PDF]])&lt;br /&gt;
;[[Netherlands March 7, 2013]]&lt;br /&gt;
*[[Netherlands March 7, 2013#Incident_Respons_in_a_Cyberwar_context|Incident Respons in a Cyberwar context - Dennis Lemckert ]]&lt;br /&gt;
*[[Netherlands_March_7,_2013#Disclosure.2C_Prevention_is_better_than_to_cure|Disclosure - Lex Borger &amp;amp; André Koot ]]&lt;br /&gt;
;[[Netherlands January 31, 2013]]:&lt;br /&gt;
*[[Netherlands_January_31,_2013#The_Truth_about_the_e.dentifier2|The Truth about the e.dentifier2 - Erik Poll]]&lt;br /&gt;
*[[Netherlands_January_31,_2013#OWASP_Update|OWASP Update - Martin Knobloch]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149859</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149859"/>
				<updated>2013-04-15T13:58:14Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;Slide Decks from recent Chapter meetings can be downloaded from the [https://www.owasp.org/index.php/Netherlands_Previous_Events_2013 Past Events page].&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 7th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 13th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; April 10th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2012&lt;br /&gt;
*November 28th and 29th, 2013 [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Previous_Events_2013&amp;diff=149858</id>
		<title>Netherlands Previous Events 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Previous_Events_2013&amp;diff=149858"/>
				<updated>2013-04-15T13:55:00Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] events held in 2013&lt;br /&gt;
;[[Netherlands April 10, 2013]]&lt;br /&gt;
*[[Netherlands_April_10,_2013#Access_Control_Design_Best_Practices|Access Control Design Best Practices - Jim Manico]] - ([[Media:Owaspnl-jimmanico-toptendefensesv8.pdf‎ | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_April_10,_2013#RESTful_web_services.2C_the_web_security_blind_spot|RESTful web services, the web security blind spot - Ofer Shezaf]] - ([[Media:Owaspnl-oferschezaf-securitytestingforrestapplicationsv6april2013.pdf | Download the presentation as PDF]])&lt;br /&gt;
;[[Netherlands March 13, 2013]]&lt;br /&gt;
*[[Netherlands_March_13,_2013#Record_It.21|Record It - Colin Watson]] - ([[Media:Owaspnl-colinwatson-recordit.pdf | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_March_13,_2013#The_smartphone_penetration_testing_framework|The smartphone penetration testing framework - Georgia Weidman]] - ([[Media:The_smartphone_penetration_testing_framework-Georgia_Weidman.pdf | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_March_13,_2013#OWASP_Cornucopia|OWASP Cornucopia - Colin Watson]] - ([[Media:Owaspnl-colinwatson-cornucopia.pdf | Download the presentation as PDF]])&lt;br /&gt;
;[[Netherlands March 7, 2013]]&lt;br /&gt;
*[[Netherlands March 7, 2013#Incident_Respons_in_a_Cyberwar_context|Incident Respons in a Cyberwar context - Dennis Lemckert ]]&lt;br /&gt;
*[[Netherlands_March_7,_2013#Disclosure.2C_Prevention_is_better_than_to_cure|Disclosure - Lex Borger &amp;amp; André Koot ]]&lt;br /&gt;
;[[Netherlands January 31, 2013]]:&lt;br /&gt;
*[[Netherlands_January_31,_2013#The_Truth_about_the_e.dentifier2|The Truth about the e.dentifier2 - Erik Poll]]&lt;br /&gt;
*[[Netherlands_January_31,_2013#OWASP_Update|OWASP Update - Martin Knobloch]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owaspnl-oferschezaf-securitytestingforrestapplicationsv6april2013.pdf&amp;diff=149856</id>
		<title>File:Owaspnl-oferschezaf-securitytestingforrestapplicationsv6april2013.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owaspnl-oferschezaf-securitytestingforrestapplicationsv6april2013.pdf&amp;diff=149856"/>
				<updated>2013-04-15T13:53:58Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Previous_Events_2013&amp;diff=149853</id>
		<title>Netherlands Previous Events 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Previous_Events_2013&amp;diff=149853"/>
				<updated>2013-04-15T13:48:24Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] events held in 2013&lt;br /&gt;
;[[Netherlands April 10, 2013]]&lt;br /&gt;
*[[Netherlands_April_10,_2013#Access_Control_Design_Best_Practices|Access Control Design Best Practices - Jim Manico]] - ([[Media:Owaspnl-jimmanico-toptendefensesv8.pdf‎ | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_April_10,_2013#RESTful_web_services.2C_the_web_security_blind_spot|RESTful web services, the web security blind spot - Ofer Shezaf]]&lt;br /&gt;
;[[Netherlands March 13, 2013]]&lt;br /&gt;
*[[Netherlands_March_13,_2013#Record_It.21|Record It - Colin Watson]] - ([[Media:Owaspnl-colinwatson-recordit.pdf | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_March_13,_2013#The_smartphone_penetration_testing_framework|The smartphone penetration testing framework - Georgia Weidman]] - ([[Media:The_smartphone_penetration_testing_framework-Georgia_Weidman.pdf | Download the presentation as PDF]])&lt;br /&gt;
*[[Netherlands_March_13,_2013#OWASP_Cornucopia|OWASP Cornucopia - Colin Watson]] - ([[Media:Owaspnl-colinwatson-cornucopia.pdf | Download the presentation as PDF]])&lt;br /&gt;
;[[Netherlands March 7, 2013]]&lt;br /&gt;
*[[Netherlands March 7, 2013#Incident_Respons_in_a_Cyberwar_context|Incident Respons in a Cyberwar context - Dennis Lemckert ]]&lt;br /&gt;
*[[Netherlands_March_7,_2013#Disclosure.2C_Prevention_is_better_than_to_cure|Disclosure - Lex Borger &amp;amp; André Koot ]]&lt;br /&gt;
;[[Netherlands January 31, 2013]]:&lt;br /&gt;
*[[Netherlands_January_31,_2013#The_Truth_about_the_e.dentifier2|The Truth about the e.dentifier2 - Erik Poll]]&lt;br /&gt;
*[[Netherlands_January_31,_2013#OWASP_Update|OWASP Update - Martin Knobloch]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owaspnl-jimmanico-toptendefensesv8.pdf&amp;diff=149852</id>
		<title>File:Owaspnl-jimmanico-toptendefensesv8.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owaspnl-jimmanico-toptendefensesv8.pdf&amp;diff=149852"/>
				<updated>2013-04-15T13:47:23Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149849</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149849"/>
				<updated>2013-04-15T13:40:29Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 7th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 13th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; April 10th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2012&lt;br /&gt;
*November 28th and 29th, 2013 [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149848</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149848"/>
				<updated>2013-04-15T13:39:49Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 7th, 2013&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; March 13th, 2013&amp;lt;/strike&amp;gt; [Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
*&amp;lt;strike&amp;gt; April 10th, 2013&amp;lt;/strike&amp;gt;[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | flyer]]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2012&lt;br /&gt;
*November 28th and 29th, 2013 [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149845</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149845"/>
				<updated>2013-04-15T13:33:16Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting07032013.eventbrite.nl March 7th, 2013]&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; [[:Netherlands March 13, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting13032013.eventbrite.nl March 13th, 2013]&amp;lt;/strike&amp;gt; Radboud University Nijmegen, Beta-faculty Huygensgebouw, Heyendaalseweg 135, Nijmegen (Parkeergarage P11)  --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [[Netherlands April 10, 2013 | Netherlands April 10, 2013 - Vrije Universiteit Amsterdam - De Boelelaan 1085, 1081 HV Amsterdam NL - Room: M129 in the FEW building]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | download the flyer]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10_poster.pdf | download the poster]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
*; [http://owaspdutchchaptermeeting10042013.eventbrite.com/#  Click here for registration]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27, 2013&lt;br /&gt;
*'''[https://www.owasp.org/index.php/AppSecEU2013 August 2th to 23rd 2013 AppSec-EU Hambug]'''&lt;br /&gt;
*September 12, 2013&lt;br /&gt;
*November 7, 2012&lt;br /&gt;
*'''[https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149844</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149844"/>
				<updated>2013-04-15T13:31:48Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [[:Netherlands March 7, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting07032013.eventbrite.nl March 7th, 2013]&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; [[:Netherlands March 13, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting13032013.eventbrite.nl March 13th, 2013]&amp;lt;/strike&amp;gt; Radboud University Nijmegen, Beta-faculty Huygensgebouw, Heyendaalseweg 135, Nijmegen (Parkeergarage P11)  --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [[Netherlands April 10, 2013 | Netherlands April 10, 2013 - Vrije Universiteit Amsterdam - De Boelelaan 1085, 1081 HV Amsterdam NL - Room: M129 in the FEW building]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | download the flyer]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10_poster.pdf | download the poster]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
*; [http://owaspdutchchaptermeeting10042013.eventbrite.com/#  Click here for registration]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27, 2013&lt;br /&gt;
*'''[https://www.owasp.org/index.php/AppSecEU2013 August 2th to 23rd 2013 AppSec-EU Hambug]'''&lt;br /&gt;
*September 12, 2013&lt;br /&gt;
*November 7, 2012&lt;br /&gt;
*'''[https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our structural Chapter and OWASP Benelux Days 2012 supporters: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149836</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149836"/>
				<updated>2013-04-15T13:11:14Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [[:Netherlands March 7, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting07032013.eventbrite.nl March 7th, 2013]&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; [[:Netherlands March 13, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting13032013.eventbrite.nl March 13th, 2013]&amp;lt;/strike&amp;gt; Radboud University Nijmegen, Beta-faculty Huygensgebouw, Heyendaalseweg 135, Nijmegen (Parkeergarage P11)  --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [[Netherlands April 10, 2013 | Netherlands April 10, 2013 - Vrije Universiteit Amsterdam - De Boelelaan 1085, 1081 HV Amsterdam NL - Room: M129 in the FEW building]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | download the flyer]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10_poster.pdf | download the poster]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
*; [http://owaspdutchchaptermeeting10042013.eventbrite.com/#  Click here for registration]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27, 2013&lt;br /&gt;
*'''[https://www.owasp.org/index.php/AppSecEU2013 August 2th to 23rd 2013 AppSec-EU Hambug]'''&lt;br /&gt;
*September 12, 2013&lt;br /&gt;
*November 7, 2012&lt;br /&gt;
*'''[https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands thanks its structural chapter supporters for 2012 and the OWASP BeNeLux Days 2012: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149835</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149835"/>
				<updated>2013-04-15T13:09:52Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: [https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 OWASP Benelux Conference]&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[http://appsecusa.org/2013/ AppSec-USA New York November 18th to 21st 2013]'''&lt;br /&gt;
&lt;br /&gt;
;'''Call for Presentations'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [[:Netherlands March 7, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting07032013.eventbrite.nl March 7th, 2013]&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; [[:Netherlands March 13, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting13032013.eventbrite.nl March 13th, 2013]&amp;lt;/strike&amp;gt; Radboud University Nijmegen, Beta-faculty Huygensgebouw, Heyendaalseweg 135, Nijmegen (Parkeergarage P11)  --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [[Netherlands April 10, 2013 | Netherlands April 10, 2013 - Vrije Universiteit Amsterdam - De Boelelaan 1085, 1081 HV Amsterdam NL - Room: M129 in the FEW building]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | download the flyer]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10_poster.pdf | download the poster]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
*; [http://owaspdutchchaptermeeting10042013.eventbrite.com/#  Click here for registration]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27, 2013&lt;br /&gt;
*'''[https://www.owasp.org/index.php/AppSecEU2013 August 2th to 23rd 2013 AppSec-EU Hambug]'''&lt;br /&gt;
*September 12, 2013&lt;br /&gt;
*November 7, 2012&lt;br /&gt;
*'''[https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2012 and the OWASP BeNeLux Days 2012: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=149809</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=149809"/>
				<updated>2013-04-15T12:51:24Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: Created page with &amp;quot;&amp;lt;center&amp;gt;Image:owaspbnl12header.jpg&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt; &amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;   &amp;lt;!-- First tab --&amp;gt; = Welcome  =  === Welcome to OWASP BeNeLux 2012  ===  ==== News ==== * Advanced O2...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:owaspbnl12header.jpg]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2012  ===&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
* Advanced O2 training, by Dinis Cruz will start at 10:30 AM!&lt;br /&gt;
* Update on the Social Event (places for the brewery visit are limited, and an alternative is offered)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dan Cornell (Denim group) - SDLC with open source tools&lt;br /&gt;
* Dinis Cruz (Security Innovation) -  Advanced O2&lt;br /&gt;
* Volkert de Buisonjé (Sogeti) - Secure Java Development with ESAPI (Hands-On )&lt;br /&gt;
* Martin Knobloch (PervaSec) - Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab)&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conferenceday ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dinis Cruz (Security Innovation) - Making Security Invisible by Becoming the Developer’s Best Friends&amp;lt;br&amp;gt;&lt;br /&gt;
* Rüdiger Bachmann (SAP) - Code review large companies&amp;lt;br&amp;gt;&lt;br /&gt;
* Lieven Desmet (Distrinet, KU Leuven) - Sandboxing JavaScript&amp;lt;br&amp;gt;&lt;br /&gt;
* Asia Slowinska (VU Amsterdam) - Body Armor for Binaries&amp;lt;br&amp;gt;&lt;br /&gt;
* Marc Hullegie and Kees Mastwijk (Vest) - Forensics&amp;lt;br&amp;gt;&lt;br /&gt;
* Dan Cornell (Denim group) - Streamlining Application Vulnerability Management: Communication Between Development and Security Teams&amp;lt;br&amp;gt;&lt;br /&gt;
* John Wilander (OWASP Sweden) - Browser security&amp;lt;br&amp;gt;&lt;br /&gt;
* Erwin Geirnaert (Zion security) - OWASP Top 10 vs Drupal&amp;lt;Br&amp;gt;&lt;br /&gt;
* Seba Deleersnyder (OWASP) - Update on OWASP&amp;lt;br&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
*Steven van der Baan, OWASP CTF Project&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl12 #owaspbnl12]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2012.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is the iMinds-DistriNet Research Group @ KU Leuven ===&lt;br /&gt;
&lt;br /&gt;
''Celestijnenlaan, 200A&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: http://distrinet.cs.kuleuven.be/about/route/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
Board house (close to the venue)&amp;lt;br&amp;gt; http://www.boardhouse.be&amp;lt;br&amp;gt;&lt;br /&gt;
The lodge (close to the venue)&amp;lt;br&amp;gt; http://www.booking.com/hotel/be/the-lodge-heverlee.en.html&amp;lt;br&amp;gt;&lt;br /&gt;
Begijnhof Congres Hotel (1 km from the venue)&amp;lt;br&amp;gt; http://www.bchotel.be/&amp;lt;br&amp;gt;&lt;br /&gt;
La Royale (2 km from the venue)&amp;lt;br&amp;gt; http://www.laroyale.be&amp;lt;br&amp;gt; &lt;br /&gt;
Hotel Ibis (2 km from the venue)&amp;lt;br&amp;gt; http://www.accorhotels.com/gb/hotel-1457-ibis-leuven-centrum/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
Mercure (2 km from the venue) &amp;lt;br&amp;gt; http://www.mercure.com/gb/hotel-7862-hotel-mercure-leuven-center/index.shtml&amp;lt;br&amp;gt; &lt;br /&gt;
New Damshire (2 km from the venue)&amp;lt;br&amp;gt; http://www.hotelnewdamshire.be&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
''Celestijnenlaan, 200A, fifth floor&amp;lt;br&amp;gt;&lt;br /&gt;
3001 Heverlee&amp;lt;br&amp;gt;&lt;br /&gt;
Belgium&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DinisCruz|Advanced O2, by Dinis Cruz &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 04.112]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#DanCornell|SDLC with Open Source tools, by Dan Cornell &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.128]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#VolkertDeBuisonje|Secure Java Development with ESAPI (hands-on), by Volkert de Buisonjé &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.152]]&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | [[#MartinKnobloch|Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt; Room 05.001]]&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;VolkertDeBuisonje&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Secure Java Development workshop with ESAPI, by Volkert de Buisonjé (Sogeti) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
First, attendees will receive a brief introduction on application awareness. Then they will get acquainted with Webgoat, a &amp;quot;deliberately insecure J2EE web application&amp;quot; designed as a practice tool for secure application development and testing. They will learn how to exploit some vulnerabilities in Webgoat, through for instance Cross-Site Scripting (CSS) and Cross-Site Request Forgery (CSRF) attacks. Finally, the ESAPI library will be introduced and the attendees will learn how to apply ESAPI to fix such vulnerabilities in Webgoat's source code.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Prerequisites for this workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
* Reasonable knowledge of and experience with Java development&lt;br /&gt;
* A laptop running a recent version of Linux, Mac OS X, or Windows&lt;br /&gt;
* The most recent version of VirtualBox (4.x) installed&lt;br /&gt;
* At least 2GB of RAM&lt;br /&gt;
* At least 2GB of disk space&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Volkert de Buisonjé is a senior Java developer at Sogeti. He specializes in, and teaches application security courses, both to coworkers and to customers. Knowledge sharing (in both directions) is his passion. Volkert likes making friends and talking a lot. He never shuns a good discussion, and prefers to bring a high amount of interactivity to his classes. :-)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Advanced O2, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Workshop:''&amp;lt;br&amp;gt;&lt;br /&gt;
The O2 platform represents a new paradigm for how to perform, document and distribute Web Application security reviews. O2 is designed to Automate Security Consultants Knowledge and Workflows and to Allow non-security experts to access and consume Security Knowledge.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MartinKnobloch&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Essential Web Appplication Security (OWASP Top 10, Webgoat, WebScarab), by Martin Knobloch (PervaSec) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This workshop is an introduction into (web) application security with hands-on labs, using OWASP documentation and tooling.&lt;br /&gt;
You will be introduced into the security mindset, discus the OWASP TopTen 2010 and learn basic skills in how to find vulnerabilities in web applications. All tools and documentation are provided during the training.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;As this is an hands-on workshop, please bring your own laptop!&amp;lt;/b&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Course structure:&lt;br /&gt;
*Introduction OWASP, OWASP tool and documentation&lt;br /&gt;
*Security Testing mindset                &lt;br /&gt;
*1st Lab: OWASP WebGoat / WebScarab                      &lt;br /&gt;
*OWASP Top Ten 2010&lt;br /&gt;
*OWASP Testing Guide                             &lt;br /&gt;
*2nd Lab: OWASP WebGoat / WebScarab              &lt;br /&gt;
*3rd Lab: OWASP Hackademic / ZAP                         &lt;br /&gt;
*Summary and completion  &lt;br /&gt;
Prerequisites for this workshop:&lt;br /&gt;
*Basic understanding of HTTP and web application testing/development&lt;br /&gt;
*An open mind&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is an independent security consultant and owner of PervaSec (http://www.pervasec.nl). His main working area is (software) security in general, from awareness to implementation. In his daily work, he is responsible for education in application security matters, advise and implementation of application security measures.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Martin is member of the Dutch chapter board and chair of the Global Education Committee and contributes to several projects.&amp;lt;br&amp;gt;&lt;br /&gt;
Martin is a frequent speaker at conferences, universities and hacker spaces.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Building a Software Security Program On Open Source Tools, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of a comprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Outline:''&amp;lt;br&amp;gt;&lt;br /&gt;
* So You Want To Roll Out A Software Security Program?&lt;br /&gt;
* The Software Assurance Maturity Model (OpenSAMM)&lt;br /&gt;
* ThreadFix: Overview&lt;br /&gt;
* Governance: Strategy and Metrics&lt;br /&gt;
** ThreadFix: Reporting&lt;br /&gt;
* Governance: Policy and Compliance&lt;br /&gt;
* Governance: Education and Guidance&lt;br /&gt;
** OWASP Development Guide&lt;br /&gt;
** OWASP Cheat Sheets&lt;br /&gt;
** OWASP Secure Coding Practices&lt;br /&gt;
* Construction: Threat Assessment&lt;br /&gt;
* Construction: Security Requirements&lt;br /&gt;
* Construction: Secure Architecture&lt;br /&gt;
** ESAPI overview&lt;br /&gt;
** Microsoft Web Protection Library (Anti-XSS) overview&lt;br /&gt;
* Verification: Design Review&lt;br /&gt;
** Microsoft Threat Analysis and Modeling Tool&lt;br /&gt;
* Verification: Code Review&lt;br /&gt;
** FindBugs&lt;br /&gt;
** FxCop&lt;br /&gt;
** CAT.NET&lt;br /&gt;
** Brakeman&lt;br /&gt;
** Agnitio&lt;br /&gt;
* Verification: Security Testing&lt;br /&gt;
** Arachni&lt;br /&gt;
** w3af&lt;br /&gt;
** ZAProxy&lt;br /&gt;
* Deployment: Vulnerability Management&lt;br /&gt;
** ThreadFix: Defect Tracker Integration&lt;br /&gt;
* Deployment: Environment Hardening&lt;br /&gt;
** Microsoft Baseline Security Analyzer (MBSA)&lt;br /&gt;
* Deployment: Operational Enablement&lt;br /&gt;
** mod_security&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 30th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The conference takes place in auditorium K.06, the registration and catering in the foyer of building 200A (ground floor)  (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome ([https://www.owasp.org/images/a/ad/OWASP_BeNeLux_Day_2012_-_Organization_welcome.ppt PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || Sebastien Deleersnyder || OWASP update ([https://www.owasp.org/images/d/d7/OWASP-Update-BeNeLux-Day-2012_v1.pptx PPT])&lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || [[#JohnWilander|John Wilander]] || ''' Secure Web Integration Patterns in the Era of HTML5'''&amp;lt;br&amp;gt;''Abstract:'' Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || [[#LievenDesmet|Lieven Desmet]] || '''Sandboxing Javascript''' ([https://www.owasp.org/images/1/10/Sandboxing-Javascript.pdf PDF])&amp;lt;br&amp;gt;''Abstract:'' The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts.&amp;lt;br&amp;gt;&lt;br /&gt;
Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || [[#ErwinGeirnaert|Erwin Geirnaert]] || '''OWASP Top 10 vs Drupal'''&amp;lt;br&amp;gt;''Abstract:'' Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || [[#AsiaSlowinska|Asia Slowinska]] || '''Body Armor for Binaries'''&amp;lt;br&amp;gt;''Abstract:'' BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || [[#MarcHullegieAndKeesMastwijk|Marc Hullegie and Kees Mastwijk]] || '''Forensics'''&amp;lt;br&amp;gt;''Abstract:'' In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || [[#DanCornell|Dan Cornell]] || '''Streamlining Application Vulnerability Management: Communication Between Development and Security Teams'''&amp;lt;br&amp;gt;''Abstract:'' Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || [[#RuedigerBachmann|Ruediger Bachmann]] || '''Code review for Large Companies'''&amp;lt;br&amp;gt;''Abstract:''Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || [[#DinisCruz|Dinis Cruz]] || '''Making Security Invisible by Becoming the Developer’s Best Friends'''&amp;lt;br&amp;gt;''Abstract:'' Coming soon!&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || &lt;br /&gt;
* Steven Wierckx&lt;br /&gt;
* Luc Beirens&lt;br /&gt;
* Jos Dumortier&lt;br /&gt;
* Dieter Sarrazyn&lt;br /&gt;
* Erwin Geirnaert&lt;br /&gt;
* John Wilander&lt;br /&gt;
|| '''Panel Discussion about the legal aspects of penetration testing'''&amp;lt;br&amp;gt; ''Abstract:'' In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2012 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;AsiaSlowinska&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;RuedigerBachmann&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.&amp;lt;br&amp;gt;&lt;br /&gt;
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;LievenDesmet&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.&amp;lt;br&amp;gt;&lt;br /&gt;
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.&amp;lt;br&amp;gt;&lt;br /&gt;
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;ErwinGeirnaert&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.&amp;lt;br&amp;gt;&lt;br /&gt;
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;MarcHullegieAndKeesMastwijk&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) === &lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2012 with you.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;JohnWilander&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DanCornell&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;DinisCruz&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
''Coming soon!''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;&lt;br /&gt;
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.&amp;lt;br&amp;gt;&lt;br /&gt;
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.&amp;lt;br&amp;gt;&lt;br /&gt;
At OWASP, Dinis is the leader of the OWASP O2 Platform project&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Panel discussion about the legal aspects of penetration testing ===&lt;br /&gt;
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt; In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Steven Wierckx, ps_testware:''&amp;lt;br&amp;gt;&lt;br /&gt;
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Luc Beirens, FCCU:''&amp;lt;br&amp;gt;&lt;br /&gt;
Head of Belgian Federal Computer Crime Unit &amp;amp; Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Jos Dumortier, ICRI:''&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R &amp;amp; D projects in the domain of telemedicine.&amp;lt;br&amp;gt;&lt;br /&gt;
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).&amp;lt;br&amp;gt;&lt;br /&gt;
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. &amp;lt;br&amp;gt;&lt;br /&gt;
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.&amp;lt;br&amp;gt;&lt;br /&gt;
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;''Bio Dieter Sarrazyn, PWC:''&amp;lt;br&amp;gt;&lt;br /&gt;
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks &amp;amp; tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 29th ====&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Important Update&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The brewery visit is limit to 60 people. Therefor, the 60 first registered people that indicated interest in the social event have been invited to participate. Any remaining tickets will be offered on Thursday around noon at the registration desk.&lt;br /&gt;
&lt;br /&gt;
If you are going by car, there are paid parkings under the Railway station and at Kinepolis (follow the parking signs). If you want to go there from the venue without car, the best way to get there is to take bus No.2 that leaves next to the building and drives to the Railway station. From there, it is a 300 m. walk to the brewery.&lt;br /&gt;
&lt;br /&gt;
All other people (and the people of the brewery tour after that has finished) are warmly invited to join us in the Downtown Jack, a pub with a number of pool and snooker tables. 5 pool tables have been exclusively reserved for us from 20h00 onwards. You can also have a drink and eat something there if you like.&lt;br /&gt;
&lt;br /&gt;
The address: Parkstraat 40, 3000 Leuven (see http://www.downtownjack.be/)&lt;br /&gt;
&lt;br /&gt;
==== &amp;lt;B&amp;gt;Brewery Visit Information&amp;lt;/B&amp;gt; ====&lt;br /&gt;
The social event will take place at the InBev Brewery in Leuven, where there will be a guided tour and a beer tasting.&amp;lt;br&amp;gt;&lt;br /&gt;
Unfortunately, the tour is limited to 60 people. Since we have more registered people than places, we will soon announce how we will&lt;br /&gt;
proceed.&amp;lt;br&amp;gt;&lt;br /&gt;
If you decide not to join, please inform the Benelux organisation, other participants will be happy to join.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''The entrance fee for the tour is 10 EUR'''. &amp;lt;br&amp;gt;&lt;br /&gt;
This amount will have to be paid to the Benelux organisation at the registration desk or upon entry in cash (please use correct notes).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Below is the address where the event takes place. You can take your car, bus number 2 or a taxi to reach this.&amp;lt;br&amp;gt; '''The tour starts at 19h30 sharp'''.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Address:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Vuurkruisenlaan z/n &amp;lt;br&amp;gt;&lt;br /&gt;
3000 Leuven&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''From the station:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Take the street 'Diestepoort' (this street is parrallel with the railway behind the building)and walk straight through. You can see the brewery at the end of the street.&amp;lt;br&amp;gt;&lt;br /&gt;
'''By car:'''&amp;lt;br&amp;gt;&lt;br /&gt;
From the street diestesteenweg or beckeremieplein head to the railroadbridge. At the crossroad take first right, this is the entrance of the brewery. from the expressway R23 head to the Hotel ''NOVOTEL''. Take the street left from ''NOVOTEL'', this is the ''vuurkruisenlaan''. On your left side you can see the brewery. At the&lt;br /&gt;
next crossroad take the first left, this is the entrance of the brewery.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''ENTRANCE BREWERY:'''&amp;lt;br&amp;gt;&lt;br /&gt;
is also the entrance for the trucks, next to the railroadbridge.&amp;lt;br&amp;gt;&lt;br /&gt;
We will meet at the entrance at 19h30 where the tour will start.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2012 and participate in the Capture the Flag event November 30th 2012.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2012&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2012!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 29th and 30th of November, 2012.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Hosted and co-organized by: ====&lt;br /&gt;
 &lt;br /&gt;
[http://distrinet.cs.kuleuven.be https://www.owasp.org/images/4/4a/Logo_distrinet.png]&lt;br /&gt;
[http://www.nessos-project.eu/ https://www.owasp.org/images/5/52/Nessos.png]&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
==== OWASP Member Sponsor: ====&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}} &lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux 2012 Sponsors: ====&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149808</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149808"/>
				<updated>2013-04-15T12:50:09Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
*November 28th and 29th, 2013: OWASP Benelux Conference&lt;br /&gt;
&lt;br /&gt;
;'''Other OWASP Events'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''[https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!]'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [[:Netherlands March 7, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting07032013.eventbrite.nl March 7th, 2013]&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; [[:Netherlands March 13, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting13032013.eventbrite.nl March 13th, 2013]&amp;lt;/strike&amp;gt; Radboud University Nijmegen, Beta-faculty Huygensgebouw, Heyendaalseweg 135, Nijmegen (Parkeergarage P11)  --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [[Netherlands April 10, 2013 | Netherlands April 10, 2013 - Vrije Universiteit Amsterdam - De Boelelaan 1085, 1081 HV Amsterdam NL - Room: M129 in the FEW building]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | download the flyer]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10_poster.pdf | download the poster]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
*; [http://owaspdutchchaptermeeting10042013.eventbrite.com/#  Click here for registration]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27, 2013&lt;br /&gt;
*'''[https://www.owasp.org/index.php/AppSecEU2013 August 2th to 23rd 2013 AppSec-EU Hambug]'''&lt;br /&gt;
*September 12, 2013&lt;br /&gt;
*November 7, 2012&lt;br /&gt;
*'''[https://www.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013 November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2012 and the OWASP BeNeLux Days 2012: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149804</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=149804"/>
				<updated>2013-04-15T12:10:45Z</updated>
		
		<summary type="html">&lt;p&gt;Favroom: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Local News  =&lt;br /&gt;
&lt;br /&gt;
;The next OWASP Netherlands Chapter meeting will be on May 14th in 's Hertogenbosch, more details soon!&lt;br /&gt;
&lt;br /&gt;
;'''Provisional 2013 Chapter Event Calendar'''&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27th, 2013&lt;br /&gt;
*September 12th, 2013&lt;br /&gt;
*November 7th, 2013&lt;br /&gt;
;'''[https://www.owasp.org/index.php/AppSecEU2013 AppSec-EU Hambug August 2th to 23rd 2013]'''&lt;br /&gt;
;'''November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!'''&lt;br /&gt;
;[https://docs.google.com/a/owasp.org/spreadsheet/viewform?formkey=dGs1UFN0Ul9YR1pRcGdYRmtYallraUE6MQ#gid=0 OWASP NL Chapter Call For Presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Follow-us-on-twitter.png|frameless|100px|link=http://www.twitter.com/owasp_NL]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=  Calendar  =&lt;br /&gt;
&lt;br /&gt;
=== Provisional Chapter Event Calendar 2013 ===&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;strike&amp;gt; January 31st, 2013 &amp;lt;/strike&amp;gt; &lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [[:Netherlands March 7, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting07032013.eventbrite.nl March 7th, 2013]&amp;lt;/strike&amp;gt; [[Media:OWASP Netherlands Chapter Meeting 2013-03-07.pdf | flyer]] &lt;br /&gt;
*&amp;lt;strike&amp;gt; [[:Netherlands March 13, 2013]]&amp;lt;/strike&amp;gt;[[Media:OWASP Netherlands Chapter Meeting 2013-03-13.pdf | flyer]]&lt;br /&gt;
&amp;lt;!-- *&amp;lt;strike&amp;gt; [http://owaspdutchchaptermeeting13032013.eventbrite.nl March 13th, 2013]&amp;lt;/strike&amp;gt; Radboud University Nijmegen, Beta-faculty Huygensgebouw, Heyendaalseweg 135, Nijmegen (Parkeergarage P11)  --&amp;gt;&lt;br /&gt;
*&amp;lt;strike&amp;gt; [[Netherlands April 10, 2013 | Netherlands April 10, 2013 - Vrije Universiteit Amsterdam - De Boelelaan 1085, 1081 HV Amsterdam NL - Room: M129 in the FEW building]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10.pdf | download the flyer]] - [[Media:OWASP Netherlands Chapter Meeting 2013-04-10_poster.pdf | download the poster]]&amp;lt;/strike&amp;gt;&lt;br /&gt;
*; [http://owaspdutchchaptermeeting10042013.eventbrite.com/#  Click here for registration]&lt;br /&gt;
*May 14th, 2013&lt;br /&gt;
*June 27, 2013&lt;br /&gt;
*'''[https://www.owasp.org/index.php/AppSecEU2013 August 2th to 23rd 2013 AppSec-EU Hambug]'''&lt;br /&gt;
*September 12, 2013&lt;br /&gt;
*November 7, 2012&lt;br /&gt;
*'''November 28th and 29th 2013: OWASP Benelux meeting in the Netherlands!'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2013|2013]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2012|2012]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2011|2011]]&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2010|2010]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Ferdinand_Vroom Ferdinand Vroom]&lt;br /&gt;
*[https://www.owasp.org/index.php/User:Knoblochmartin Martin Knobloch], PervaSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[mailto:netherlands@owasp.org OWASP Netherlands], OWASP Netherlands board email adres&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth and last tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Support  =&lt;br /&gt;
&lt;br /&gt;
=== Chapter Sponsoring  ===&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. &lt;br /&gt;
If you are interested in sponsoring the Netherlands chapter please contact us via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
=== Donation ===&lt;br /&gt;
&lt;br /&gt;
If you would like to donate to our chapter, please use the PayPal link at the top of this page.&lt;br /&gt;
Thank you!&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
Interested in presenting at a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&lt;br /&gt;
=== Call for Location  ===&lt;br /&gt;
&lt;br /&gt;
For the OWASP Netherlands chapter meetings to come, we are continuously looking for locations! &lt;br /&gt;
&lt;br /&gt;
Most preferable, the location is good accessible with public transport and by car. Free parking should be provided. &lt;br /&gt;
&lt;br /&gt;
What do we expect: &lt;br /&gt;
&lt;br /&gt;
*meeting room for at least 50 people &lt;br /&gt;
*lunch for attendees &lt;br /&gt;
**drinks, sandwiches... &lt;br /&gt;
*a small present for the speakers &lt;br /&gt;
**(e.g. bottle of wine, for speakers from aboard alcohol might be less practical if flying in only with hand luggage)&lt;br /&gt;
&lt;br /&gt;
Interested in sponsoring a local chapter meeting, please send an email to: netherlands 'at' owasp.org &lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Belgium thanks its structural chapter supporters for 2012 and the OWASP BeNeLux Days 2012: &lt;br /&gt;
&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Favroom</name></author>	</entry>

	</feed>