<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Lebbeous</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Lebbeous"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Lebbeous"/>
		<updated>2026-05-15T10:59:48Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Training&amp;diff=43542</id>
		<title>OWASP EU Summit 2008 Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Training&amp;diff=43542"/>
				<updated>2008-10-17T16:05:06Z</updated>
		
		<summary type="html">&lt;p&gt;Lebbeous: /* How to Win AppSec Hacking Contests and Deploy Better Web Applications - instructors can't attend */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;EU Summit 2008 Trainings&lt;br /&gt;
&lt;br /&gt;
cvent links to be added.&lt;br /&gt;
&lt;br /&gt;
Upon completion and scheduling, trainings will be copied over from [[OWASP EU Summit 2008 Training (Courses to be Approved)]]&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP EU Summit 2008]]&lt;br /&gt;
&lt;br /&gt;
== WebAppSec for Managers and Executives - The Road Less Travelled ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Manopaul Mano Paul]&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
With the financial turn tables of major corporations resting on web applications that connect businesses, transmit and store sensitive financial and personal transaction, combined with the ubiquitous nature of the web; it is imperative that web applications that are designed, architected and developed are secure.&lt;br /&gt;
&lt;br /&gt;
What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowned poet, Robert Frost ends by with the statement &amp;quot;And that has made all the difference&amp;quot;. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective that would make ALL the difference for you and your company.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
This session is for Management primarily and any stakeholder that needs to understand how understanding application security concepts can benefit their organizations/companies in designing secure web applications. Whether you are a novice or an expert, you will all leave learning something new to lead your teams and help design the next generation of hack-resilient web applications. &lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
1.	Introduction &lt;br /&gt;
&lt;br /&gt;
2.	Changing Landscape&lt;br /&gt;
&lt;br /&gt;
3.	Drivers of Web Application Security&lt;br /&gt;
&lt;br /&gt;
4.	From the Boardroom to the Builder, Client to the Coder&lt;br /&gt;
&lt;br /&gt;
5.	Regulations, Compliance and Security&lt;br /&gt;
&lt;br /&gt;
6.	Information Security Management Top 10&lt;br /&gt;
&lt;br /&gt;
7.      OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
8.	Software Security Concepts&lt;br /&gt;
&lt;br /&gt;
9.	Security in the SDLC - Requirements to Release&lt;br /&gt;
&lt;br /&gt;
10.	Software Risk Management &lt;br /&gt;
&lt;br /&gt;
11.	Data Classification &lt;br /&gt;
&lt;br /&gt;
12.	Common Web Application Threats and Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
13.	Security in an Outsourced World&lt;br /&gt;
&lt;br /&gt;
14.	Web 2.0 Security&lt;br /&gt;
&lt;br /&gt;
15.	Self Service Programs&lt;br /&gt;
&lt;br /&gt;
16.	Awareness, Training, Education &amp;amp; Certification&lt;br /&gt;
&lt;br /&gt;
17.     Hiring and Staffing &lt;br /&gt;
&lt;br /&gt;
18.	Information Security Framework&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
No specific requirement. Come for a fun, interactive session that will cover the basic and advanced elements of web application security for executives and managers - the road less travelled, filled with exercises for the attendees to participate.&lt;br /&gt;
&lt;br /&gt;
== The Art and Science of Threat Modeling Web Applications ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Manopaul Mano Paul]&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
To secure your home, you will first need to know how the thief could possibly enter and exit and where you should store your valuables. The same is true of your web applications. Unless you know what the vulnerabilities and threats of your web applications are, and what security measures you should take to protect them, ev1L h@x0rS or the enemy within (insider) could take advantage of the vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
Threat Modeling is a technique that you can use to identify ATVS (attacks, threats, vulnerabilities and safeguards) that could affect your web applications. Threat Modeling helps in designing your application securely from a confidentiality, integrity, availability, authentication, authorization and auditing perspective. It is an essential activity to be undertaken during the design stage of your SDLC and helps mitigate and minimize overall risk. &lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
This session is for Management, Technical (Developer, QA, Security ...) and Operational professionals and any stakeholder that needs to understand how threat modeling can benefit their organizations/companies in designing secure web applications. Whether you are a novice or an expert apropos threat modeling, you will all leave learning something new to design the next generation of hack-resilient web applications. &lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
1.  Introduction &lt;br /&gt;
&lt;br /&gt;
2.  Why Threat Model?&lt;br /&gt;
&lt;br /&gt;
3.  Is Threat Modeling Right for You?&lt;br /&gt;
&lt;br /&gt;
4.  Challenges&lt;br /&gt;
&lt;br /&gt;
5.  Precursors&lt;br /&gt;
&lt;br /&gt;
6.  Data Classification and Threat Modeling&lt;br /&gt;
&lt;br /&gt;
7.  Web Application Security Mechanisms&lt;br /&gt;
&lt;br /&gt;
8.  Benefits of Threat Modeling&lt;br /&gt;
&lt;br /&gt;
9.  Common Glossary of Terms&lt;br /&gt;
&lt;br /&gt;
10. Threat Agents&lt;br /&gt;
&lt;br /&gt;
11. Threat Modeling Process&lt;br /&gt;
&lt;br /&gt;
12. Attack Trees&lt;br /&gt;
&lt;br /&gt;
13. STRIDE and DREAD&lt;br /&gt;
&lt;br /&gt;
14. Threat to Risk&lt;br /&gt;
&lt;br /&gt;
15. Threat Modeling (Exercise)&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
No specific requirement. Come for a fun, hands-on, interactive session that will cover the basic and advanced elements of threat modeling, filled with exercises for the attendees to participate. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Web server/services hardening using SELinux ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Pavol Luptak&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Security-Enhanced Linux (SELinux) is a FLASK implementation integrated in the Linux kernel with a number of utilities designed to provide mandatory access controls (MAC) through the use of Linux Security Modules (LSM) in the Linux kernel. SELinux generally supports many kinds of mandatory access control policies, including those based on the concepts of type enforcement, role-based access control, and multi-level security. &lt;br /&gt;
&lt;br /&gt;
A Linux kernel integrating SELinux enforces mandatory access control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the  ability of these programs and daemons to cause harm when compromised (via buffer overflows or misconfigurations, for example). This confinement  mechanism operates independently of the traditional Linux access control  mechanisms. It has no concept of a &amp;quot;root&amp;quot; super-user, and does not share the  well-known shortcomings of the traditional Linux security mechanisms (such as a dependence on setuid/setgid binaries).&lt;br /&gt;
&lt;br /&gt;
This training provides basic concepts of SELinux, its differences to classical UNIX/Linux systems, describe security advantages of mandatory access control policies and teach how to effectively and rapidly configure a fully functional LAMP environment on SELinux system.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Security consultants, system administators, programmers focused on system security&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
1. SELinux history&lt;br /&gt;
&lt;br /&gt;
2. Unix/Linux DAC (Discretionary Access Control) and its problems&lt;br /&gt;
&lt;br /&gt;
3. MAC (Mandatory Access Control)&lt;br /&gt;
&lt;br /&gt;
4. Advantages of using MAC &lt;br /&gt;
&lt;br /&gt;
5. DTE (Domain Type Enforcement) model&lt;br /&gt;
&lt;br /&gt;
6. RBAC (Roles Based Access Control) model&lt;br /&gt;
&lt;br /&gt;
7. MLS (Multi Level Security) model&lt;br /&gt;
&lt;br /&gt;
8. SELinux FLASK Architecture&lt;br /&gt;
&lt;br /&gt;
9. SELinux policy (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
10. File System Security Contexts (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
11. SELinux Object Classes and Permissions&lt;br /&gt;
&lt;br /&gt;
12. TE (Type Enforcement) Rules (Attributes, Type Declaration, Type Transitions, Domain Type Transitions, Object Labeling Transitions, Access Vectors)&lt;br /&gt;
&lt;br /&gt;
13. Understanding AVC, log messages&lt;br /&gt;
&lt;br /&gt;
14. audit2allow and audit2why (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
15. SELinux Troubleshoot Tool (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
16. Auditing and Auditing tools&lt;br /&gt;
&lt;br /&gt;
17. Policy Macros&lt;br /&gt;
&lt;br /&gt;
18. Backtracking rule (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
19. SELinux Users, Roles, MLS Levels&lt;br /&gt;
&lt;br /&gt;
20. Strict Policy&lt;br /&gt;
&lt;br /&gt;
21. Targeted Policy&lt;br /&gt;
&lt;br /&gt;
22. SELinux Booleans and their use for Apache web server (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
23. Files and Directories in Targeted Policy, common SELinux Macros (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
24. Analyzing Example Policy - apache.te (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
25. Assigning Object and Process Types &lt;br /&gt;
&lt;br /&gt;
26. SELinux Booting&lt;br /&gt;
&lt;br /&gt;
27. Copying and moving files, checking security contexts, relabeling a file and directory's security context (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
28. Policy core utilities&lt;br /&gt;
&lt;br /&gt;
29. Managing File Labeling, Relabeling a File System (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
30. SELinux Administrator GUI (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
31. SELinux Modules (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
32. Hardening existing LAMP environments using SELinux (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
33. Writing New Policy for a Daemon (EXERCISE for clever students)&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop. Each student will have own SELinux virtual machine for his experiments.&lt;br /&gt;
&lt;br /&gt;
== Secure Programming with Java ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Lucas C. Ferreira&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 Day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This training class will present best practices of secure programming in the Java language. It includes Java specific practices (i.e. how to avoid problems that arise from the compilation of Java source code to the bytecode language used by the JVM) and practices that may arise in other programming languages (with examples in Java). Some tools that may be used to verify the security of Java code and systems will be shown.&lt;br /&gt;
&lt;br /&gt;
The topics include a quick overview of the OWASP Top 10, in order to contextualize the practices presented, and several best practices aimed at the different software layers. At the presentation layer, we focus on input validation, access control issues and dealing with exceptions. At the business objects layer, the practices deal with cloning and serialization issues. Practices to prevent command injection are presented at the persistence layer. Practices that should be used throughout all the software are also presented, including input data validation, class and method visibility, using and storing secrets, dealing with inner classes, overflows and boxing, and object initialization.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Java web application developers. This training requires basic understanding of web applications and an intermediate level of proficiency in the Java language and Object Oriented concepts. People with interest in other OO languages may also benefit from this training, but specific techniques, examples and tools used are targeted to Java.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
# OWASP Top 10 - quick overview&lt;br /&gt;
# Secure Programming Best Practices&lt;br /&gt;
## Presentation layer&lt;br /&gt;
### Preventing cross-site scripting&lt;br /&gt;
### Access control&lt;br /&gt;
### Request validation&lt;br /&gt;
### Error treatment&lt;br /&gt;
## Business object layer&lt;br /&gt;
### Cloning and serialization issues&lt;br /&gt;
## Persistence layer&lt;br /&gt;
### Command injection issues&lt;br /&gt;
### Database access users and permissions&lt;br /&gt;
### file manipulation&lt;br /&gt;
## Infra-structure layer&lt;br /&gt;
### J2EE container-related best practices&lt;br /&gt;
### Native method issues&lt;br /&gt;
### SSL and encryption&lt;br /&gt;
## Practices for all software layers&lt;br /&gt;
### Data validation&lt;br /&gt;
### Garbage collection issues&lt;br /&gt;
### Classes and method scoping&lt;br /&gt;
### Use of secrets&lt;br /&gt;
### Inner class issues&lt;br /&gt;
### Over/underflow and boxing issues&lt;br /&gt;
# Tools&lt;br /&gt;
## Code review tool&lt;br /&gt;
## Data flow tool&lt;br /&gt;
## Pen-testing tool&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Laptop not required.&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 - What Developers Should Know on Web Application Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Sebastien Deleersnyder and Martin Knobloch&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4 h&lt;br /&gt;
To be scheduled on Tuesday.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Application security is an essential component of any successful project; this includes web applications, open source PHP applications, web services and proprietary business web sites.&lt;br /&gt;
Web application security education and awareness is needed throughout the entire development and deployment organization. Each area and level of development or deployment organizations have specific needs and requirements regarding web application security education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience.&lt;br /&gt;
&lt;br /&gt;
The OWASP Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences.&lt;br /&gt;
This Education Track provides in a 4 hour session covering what developers should know on web application security. It starts with an explanation of web application security and why it is important. Then the OWASP Top 10 is used to explain the nastiest vulnerabilities and how these can be prevented or re mediated. A secure coding initiative must deal with all stages of a program’s life cycle. Secure web applications are only possible when a secure SDLC is used. The SDLC is explained from the standpoint of people, processes and tools. Particularly for developers good secure development practices are covered in a separate topic. Finally the track finishes with an exhaustive list of web application security resources for web application developers.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web application developers who are unaware there are security issues with contemporary web applications. No prior knowledge of web application security is assumed nor necessary. This track is independent of the coding language or web frameworks used; like PHP, JSF, Java EE or .NET. We must realize that web application developers are only one link - albeit an important one - of the chain that represents the security of a web application. This track aims to make that link as secure as possible, given the constraint of 4 hours. Another important aspect is that web application security should be tailored to the risk profile of an organization and the specific development environment of that organization.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
The challenge is to cover web application security in 4 hours to a web application developer. This is presented in such a way that the developers will be able to recognize and correct web application vulnerabilities in their projects. &lt;br /&gt;
&lt;br /&gt;
* [[Education Module Why WebAppSec Matters|Why WebAppSec matters]] (20 min) ([http://www.owasp.org/images/5/58/Education_Module_Why_WebAppSec_Matters.ppt direct link])&lt;br /&gt;
:This part is the introduction of the track. It identifies the current security problems with web applications. During the introduction a definition of web application security is given. Trends that are influencing the current state of web application insecurity are also explained.&lt;br /&gt;
:*What goes wrong&lt;br /&gt;
:*WebAppSec Defined&lt;br /&gt;
:*Current trends&lt;br /&gt;
* [[Education_Module_OWASP_Top_10_Introduction_and_Remedies|OWASP Top 10 Introduction &amp;amp; Remedies]] (90 min) ([http://www.owasp.org/images/b/b8/Education_Module_OWASP_Top_10_Introduction_and_Remedies.ppt direct link])&lt;br /&gt;
:The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most common web application security vulnerabilities. The Top 10 provides basic methods to protect against these vulnerabilities.&lt;br /&gt;
:*[[Education Module Cross Site Scripting (XSS)|Cross Site Scripting (XSS)]]&lt;br /&gt;
:*Injection Flaws&lt;br /&gt;
:*Malicious File Execution&lt;br /&gt;
:*Insecure Direct Object Reference&lt;br /&gt;
:*Cross Site Request Forgery (CSRF)&lt;br /&gt;
:*Information Leakage and Improper Error Handling&lt;br /&gt;
:*Broken Authentication and Session Management&lt;br /&gt;
:*Insecure Cryptographic Storage&lt;br /&gt;
:*Insecure Communications&lt;br /&gt;
:*Failure to Restrict URL Access&lt;br /&gt;
*[[Education Module Embed within SDLC|Embed within SDLC]] (People, Processes &amp;amp; Tools) (20 min) ([http://www.owasp.org/images/f/f2/Education_Module_Embed_within_SDLC.ppt direct link])&lt;br /&gt;
:There is no silver bullet when it comes to securing web applications. This problem has to be addressed from different angles, covering the involved actors, processes: development as well as deployment and Technologies.&lt;br /&gt;
:*People Awareness and Education&lt;br /&gt;
:*Development WebAppSec Controls&lt;br /&gt;
:*Deployment WebAppSec Controls&lt;br /&gt;
:*WebAppSec Tools&lt;br /&gt;
*[[Education Module Good Secure Development Practices|Good Secure Development Practices]] (70 min) ([http://www.owasp.org/images/5/57/Education_Module_Good_Secure_Development_Practices.ppt direct link])&lt;br /&gt;
:Next to the Top 10 remedies this module provides some good secure development practices from the OWASP Guide, covering e.g.&lt;br /&gt;
:*Validating User Input &lt;br /&gt;
:*Authentication&lt;br /&gt;
:*Authorization&lt;br /&gt;
:*Session Management&lt;br /&gt;
:*Using Interpreters&lt;br /&gt;
:*Crypto&lt;br /&gt;
:*Catching Errors&lt;br /&gt;
:*File System&lt;br /&gt;
:*Configuration&lt;br /&gt;
:*Web 2.0&lt;br /&gt;
*[[Education Module Testing for Vulnerabilities|Testing for Vulnerabilities]] (20 min) ([http://www.owasp.org/images/4/49/Education_Module_Testing_for_Vulnerabilities.ppt direct link])&lt;br /&gt;
:One important aspect is to test for application vulnerabilities. During this short module an introduction is provided together with some WebGoat test cases.&lt;br /&gt;
:*Testing for application vulnerabilities&lt;br /&gt;
:*The OWASP Testing Guide&lt;br /&gt;
:*WebGoat demonstrated&lt;br /&gt;
*[[Education Module Good WebAppSec Resources|Good WebAppSec Resources]] (not limited to OWASP) (10 min) ([http://www.owasp.org/images/f/fe/Education_Module_Good_WebAppSec_Resources.ppt direct link])&lt;br /&gt;
:This 4 hour education track in only the beginning of your journey. Web application security is a moving target. New vulnerabilities and threats are discovered regularly. Web application security controls are becoming mature. The following resources should provide you with enough pointers to serve both as reference and for further research.&lt;br /&gt;
:*Hard Copy&lt;br /&gt;
:*Web Sites&lt;br /&gt;
:*Mailing lists&lt;br /&gt;
:*Blogs&lt;br /&gt;
*Roundup (10 min)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
No specific prerequisites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Classic ASP Security using OWASP tools ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Juan Carlos Calderon&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day &lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Classic ASP 2.0 and 3.0 applications are still largely used as this technology is more than 10 years old and was largely used. there are thousands of sites on the wild that need guidance on the security arena. This is where OWASP can come up and provide help for “making the Web a better place”.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
People involved in development/maintenance of Classic ASP applications at all levels, including developers, Application Architects, testers, etc.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
*Secure programming on ASP using [[ESAPI|OWASP ESAPI]]&lt;br /&gt;
*Auditing ASP code with [[:Category:OWASP_Code_Review_Project|Code Review Project]] checklist&lt;br /&gt;
*Implementing [[:Category:OWASP_Stinger_Project|OWASP Stinger]] protection for Classic ASP &lt;br /&gt;
*Complementary security best practices.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
None. Keep posted for changes on the table of contents and course specifics.&lt;br /&gt;
&lt;br /&gt;
== Web Application Assessments ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Vicente Aguilera Diaz&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
As in the physical world, the &amp;quot;professionals&amp;quot; attackers spend most of their time to analysing its objective and try to gather as much information as possible about it. The more information becomes available and is more detailed and accurate, the attack is more likely to succeed.&lt;br /&gt;
&lt;br /&gt;
The aim of this course is to identify patterns and tools to perform this analysis (step prior to the attack), and is supplemented by a case study on a practical application.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Software developers, security consultants, system administrators and people loving security.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
# Introduction&lt;br /&gt;
# Web Application Discovery&lt;br /&gt;
# Gathering information on the target web application&lt;br /&gt;
## Search Engines&lt;br /&gt;
## Interaction with external entities and information services&lt;br /&gt;
## Analysis of existing information in the web application (public information, information leaks, causing errors, etc.).&lt;br /&gt;
# Knowing / Understand the target&lt;br /&gt;
## Identifying characteristics (technologies, platforms, user profiles, features, etc.).&lt;br /&gt;
## Analysis of infrastructure components: databases, Web servers, application servers, authentication servers, etc.).  Detection and identification.&lt;br /&gt;
## Identification of the exposition area&lt;br /&gt;
# Analysis of attack vectors and vulnerabilities exploitation&lt;br /&gt;
# Case Study&lt;br /&gt;
## Assessment of an webmail application &lt;br /&gt;
## Vulnerability exploitation: IMAP / SMTP Injection&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop.&lt;br /&gt;
&lt;br /&gt;
== Hacking Owasp Orizon Project v1.0 ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Paolo Perego&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
In the course it will be presented Owasp Orizon v1.0 framework. The major APIs will be fully explained and it will be built a simple scanning tool using the Orizon framework.&lt;br /&gt;
&lt;br /&gt;
The course goal is to let people fully understand Orizon internals and let people understand how to use the framework in a real world.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Security specialist, code reviewers and curious developers&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* Owasp Orizon Internals&lt;br /&gt;
** Translation engine&lt;br /&gt;
** Owasp Orizon XML project&lt;br /&gt;
*** XML used in writing security checks&lt;br /&gt;
*** XML used in translation phase&lt;br /&gt;
** Static analysis engine&lt;br /&gt;
** Crawling engine&lt;br /&gt;
** Reporting engine&lt;br /&gt;
* Create a simple tool using Orizon&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
People have to bring their own laptop with latest Owasp Orizon version, J2SE 1.6 or later and a Java IDE (e.g. eclipse) is also feasible.&lt;br /&gt;
&lt;br /&gt;
== Securing WebGoat with ModSecurity  ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Stephen Craig Evans&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
ModSecurity, normally a tool of the network security group, has capabilities that can allow a  software security specialist with programming skills to mitigate business logic flaws and other  vulnerabilities that are out-of-reach of basic blacklists.&lt;br /&gt;
&lt;br /&gt;
This 4 hour course covers the highlights of the Summer of Code 2008 project, &amp;quot;Securing WebGoat using  ModSecurity&amp;quot; (please see  https://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project and the  project wiki).&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
* Users of ModSecurity that want to learn how it can be leveraged beyond the basic rule sets in order to mitigate vulnerabilities in areas such as authentication, AJAX, and output sanitization&lt;br /&gt;
* Web application specialists, especially pentesters, who want to learn how ModSecurity can offer an additional remedial solution to customers when the application cannot be touched&lt;br /&gt;
* Curious people that are wondering what the hell this project is about&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* ModSecurity basics&lt;br /&gt;
* WebGoat overview&lt;br /&gt;
* A walkthrough of the &amp;quot;Securing WebGoat using ModSecurity&amp;quot; Summer of Code 2008 project&lt;br /&gt;
* Mitigating WebGoat vulnerabilities using the ModSecurity core rule set&lt;br /&gt;
* Using ModSecurity's Lua scripting language:&lt;br /&gt;
** For its programming capabilities (including re-building the Lua library to include 3rd party functionality)&lt;br /&gt;
** To implement configuration files&lt;br /&gt;
** For global persistence&lt;br /&gt;
** And much, much, more...&lt;br /&gt;
* Using ModSecurity's Javascript injection (prepend and append):&lt;br /&gt;
** To substitute/override/extend existing Javascript functions&lt;br /&gt;
** To enhance the user experience when implementing a ModSecurity solution on the back end such as an authentication mechanism &lt;br /&gt;
* Using ModSecurity's session collection, Lua script, and Javascript injection together to mitigate almost any vulnerability&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Demos (including strategy and implementation) of the most interesting lesson solutions will be shown.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Uncovering WebScarab's Secret Treasures ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Rogan Dawes&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
OWASP WebScarab has a lot of hidden features that probably no one but the author really knows about. This in depth hands on session will show delegates how to access these features, and how to use them to their full potential.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Application reviewers, developers&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* Using the spider&lt;br /&gt;
* Manual Request Transforms&lt;br /&gt;
* What is the XSS/CRLF plugin, and how does it work?&lt;br /&gt;
* Using the Fuzzer&lt;br /&gt;
* Comparing Responses&lt;br /&gt;
* Searching WebScarab history&lt;br /&gt;
* Exploring the Beanshell&lt;br /&gt;
** Writing Proxy Intercept scripts&lt;br /&gt;
** Writing Script Manager Scripts&lt;br /&gt;
** Writing other scripts&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Advanced Web Application Security Testing ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Michael Coates, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
2 days.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own Windows based laptop&lt;br /&gt;
&lt;br /&gt;
== Building Secure Web 2.0 Applications ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Arshan Dabirsiaghi, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Web 2.0 applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure.  this one day training addresses the special issues that arise in this type of application development.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own Windows based laptop&lt;br /&gt;
&lt;br /&gt;
== Building Secure Web Services ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
2 days.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures.  this session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identify servers and related software.  Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own Windows based laptop&lt;br /&gt;
&lt;br /&gt;
== Building Secure Web Applications with OWASP's Enterprise Security API (ESAPI) ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course will teach you about OWASP's new Enterprise Security API (ESAPI), what it is composed of, and how to use it to improve the security and reduce the cost of developing those applications. This class covers each interface within the API, how it is intended to be used, and what the benefits are of using this interface, over other techniques for addressing the same security concerns.&lt;br /&gt;
&lt;br /&gt;
The course also discusses how to bring ESAPI into your organization and how to tailor it for your organization specific needs and application infrastructure.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own Windows based laptop&lt;br /&gt;
&lt;br /&gt;
== Ajax Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Brad Causey&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1/2 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course will provide an introductory to AJAX, its inherent security issues, how to detect them, and how to resolve them.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web Application Security Professionals&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents&lt;br /&gt;
'''&lt;br /&gt;
* Introduction to AJAX&lt;br /&gt;
* Security Issues with architecture&lt;br /&gt;
* Toolkits&lt;br /&gt;
* Toolkit Security Concerns&lt;br /&gt;
* Bridges and Issues&lt;br /&gt;
* Attacking AJAX&lt;br /&gt;
* Defending AJAX&lt;br /&gt;
* Securing the Code&lt;br /&gt;
* Best Practices&lt;br /&gt;
* Other Issues and Concerns&lt;br /&gt;
* Q and A&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Please bring your own laptop with your choice of web proxy and browser installed if you wish to participate. Participation is optional.&lt;br /&gt;
&lt;br /&gt;
== Flash Player Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Peleus Uhley&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1/2 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course will provide an overview of the Flash Player security model and common architectures for Flash deployment.  The course is targeted at people who need to understand the fundamentals of Flash Player security and how it will affect their website such as CSOs, web designers and web architects.  The goal of the course is to provide the student with the enough information to architect a secure Flash deployment.  The follow-on Auditing Flash Applications course will continue to build on this knowledge on an API by API level. &lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web Application Security Professionals and those who make decisions or recommendations about Flash deployments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please bring your own laptop with your choice of web browser installed if you wish to participate. Participation is optional.&lt;br /&gt;
&lt;br /&gt;
== Auditing Flash Applications ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Peleus Uhley&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1/2 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is a follow on to the Flash Player Security course for those who want to do a deep dive into the security of Flash applications.  This course is targeted at Flash authors and web-site auditors who need to validate Flash code and provide meaningful recommendations and best practices for improving Flash deployments.  The goal of the course is to provide the student with the tools and information to audit a Flash website and provide quality feedback on how to remediate any issues.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Flash Developers, Web Application Penetration Testers&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please bring your own laptop with your choice of web browser installed if you wish to participate. Participation is optional.&lt;br /&gt;
== Testing Guide Training ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Matteo Meucci, Giorgio Fedon - Minded Security.&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course will discuss the new OWASP Testing Guide v3 methodology and the most relevant tests of the 66 total controls of the Guide. You can learn how to test a web application and how to write a report.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Software developers, security consultants, auditors.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
The course will discuss the methology and will analize the 9 sub-categories of the Testing Guide:&lt;br /&gt;
&lt;br /&gt;
* Configuration Management Testing&lt;br /&gt;
* Business Logic Testing&lt;br /&gt;
* Authentication Testing&lt;br /&gt;
* Authorization testing&lt;br /&gt;
* Session Management Testing&lt;br /&gt;
* Data Validation Testing&lt;br /&gt;
* Denial of Service Testing&lt;br /&gt;
* Web Services Testing&lt;br /&gt;
* Ajax Testing &lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop.&lt;/div&gt;</summary>
		<author><name>Lebbeous</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Training&amp;diff=42755</id>
		<title>OWASP EU Summit 2008 Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Training&amp;diff=42755"/>
				<updated>2008-10-09T15:42:38Z</updated>
		
		<summary type="html">&lt;p&gt;Lebbeous: /* add &amp;quot;marketing edge&amp;quot; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;EU Summit 2008 Trainings&lt;br /&gt;
&lt;br /&gt;
cvent links to be added.&lt;br /&gt;
&lt;br /&gt;
Upon completion and scheduling, trainings will be copied over from [[OWASP EU Summit 2008 Training (Courses to be Approved)]]&lt;br /&gt;
&lt;br /&gt;
Back to [[OWASP EU Summit 2008]]&lt;br /&gt;
&lt;br /&gt;
== Web server/services hardening using SELinux ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Pavol Luptak&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Security-Enhanced Linux (SELinux) is a FLASK implementation integrated in the Linux kernel with a number of utilities designed to provide mandatory access controls (MAC) through the use of Linux Security Modules (LSM) in the Linux kernel. SELinux generally supports many kinds of mandatory access control policies, including those based on the concepts of type enforcement, role-based access control, and multi-level security. &lt;br /&gt;
&lt;br /&gt;
A Linux kernel integrating SELinux enforces mandatory access control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the  ability of these programs and daemons to cause harm when compromised (via buffer overflows or misconfigurations, for example). This confinement  mechanism operates independently of the traditional Linux access control  mechanisms. It has no concept of a &amp;quot;root&amp;quot; super-user, and does not share the  well-known shortcomings of the traditional Linux security mechanisms (such as a dependence on setuid/setgid binaries).&lt;br /&gt;
&lt;br /&gt;
This training provides basic concepts of SELinux, its differences to classical UNIX/Linux systems, describe security advantages of mandatory access control policies and teach how to effectively and rapidly configure a fully functional LAMP environment on SELinux system.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Security consultants, system administators, programmers focused on system security&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
1. SELinux history&lt;br /&gt;
&lt;br /&gt;
2. Unix/Linux DAC (Discretionary Access Control) and its problems&lt;br /&gt;
&lt;br /&gt;
3. MAC (Mandatory Access Control)&lt;br /&gt;
&lt;br /&gt;
4. Advantages of using MAC &lt;br /&gt;
&lt;br /&gt;
5. DTE (Domain Type Enforcement) model&lt;br /&gt;
&lt;br /&gt;
6. RBAC (Roles Based Access Control) model&lt;br /&gt;
&lt;br /&gt;
7. MLS (Multi Level Security) model&lt;br /&gt;
&lt;br /&gt;
8. SELinux FLASK Architecture&lt;br /&gt;
&lt;br /&gt;
9. SELinux policy (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
10. File System Security Contexts (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
11. SELinux Object Classes and Permissions&lt;br /&gt;
&lt;br /&gt;
12. TE (Type Enforcement) Rules (Attributes, Type Declaration, Type Transitions, Domain Type Transitions, Object Labeling Transitions, Access Vectors)&lt;br /&gt;
&lt;br /&gt;
13. Understanding AVC, log messages&lt;br /&gt;
&lt;br /&gt;
14. audit2allow and audit2why (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
15. SELinux Troubleshoot Tool (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
16. Auditing and Auditing tools&lt;br /&gt;
&lt;br /&gt;
17. Policy Macros&lt;br /&gt;
&lt;br /&gt;
18. Backtracking rule (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
19. SELinux Users, Roles, MLS Levels&lt;br /&gt;
&lt;br /&gt;
20. Strict Policy&lt;br /&gt;
&lt;br /&gt;
21. Targeted Policy&lt;br /&gt;
&lt;br /&gt;
22. SELinux Booleans and their use for Apache web server (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
23. Files and Directories in Targeted Policy, common SELinux Macros (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
24. Analyzing Example Policy - apache.te (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
25. Assigning Object and Process Types &lt;br /&gt;
&lt;br /&gt;
26. SELinux Booting&lt;br /&gt;
&lt;br /&gt;
27. Copying and moving files, checking security contexts, relabeling a file and directory's security context (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
28. Policy core utilities&lt;br /&gt;
&lt;br /&gt;
29. Managing File Labeling, Relabeling a File System (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
30. SELinux Administrator GUI (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
31. SELinux Modules (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
32. Hardening existing LAMP environments using SELinux (EXERCISE)&lt;br /&gt;
&lt;br /&gt;
33. Writing New Policy for a Daemon (EXERCISE for clever students)&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop. Each student will have own SELinux virtual machine for his experiments.&lt;br /&gt;
&lt;br /&gt;
== Secure Programming with Java ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Lucas C. Ferreira&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 Day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This training class will present best practices of secure programming in the Java language. It includes Java specific practices (i.e. how to avoid problems that arise from the compilation of Java source code to the bytecode language used by the JVM) and practices that may arise in other programming languages (with examples in Java). Some tools that may be used to verify the security of Java code and systems will be shown.&lt;br /&gt;
&lt;br /&gt;
The topics include a quick overview of the OWASP Top 10, in order to contextualize the practices presented, and several best practices aimed at the different software layers. At the presentation layer, we focus on input validation, access control issues and dealing with exceptions. At the business objects layer, the practices deal with cloning and serialization issues. Practices to prevent command injection are presented at the persistence layer. Practices that should be used throughout all the software are also presented, including input data validation, class and method visibility, using and storing secrets, dealing with inner classes, overflows and boxing, and object initialization.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Java web application developers. This training requires basic understanding of web applications and an intermediate level of proficiency in the Java language and Object Oriented concepts. People with interest in other OO languages may also benefit from this training, but specific techniques, examples and tools used are targeted to Java.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
# OWASP Top 10 - quick overview&lt;br /&gt;
# Secure Programming Best Practices&lt;br /&gt;
## Presentation layer&lt;br /&gt;
### Preventing cross-site scripting&lt;br /&gt;
### Access control&lt;br /&gt;
### Request validation&lt;br /&gt;
### Error treatment&lt;br /&gt;
## Business object layer&lt;br /&gt;
### Cloning and serialization issues&lt;br /&gt;
## Persistence layer&lt;br /&gt;
### Command injection issues&lt;br /&gt;
### Database access users and permissions&lt;br /&gt;
### file manipulation&lt;br /&gt;
## Infra-structure layer&lt;br /&gt;
### J2EE container-related best practices&lt;br /&gt;
### Native method issues&lt;br /&gt;
### SSL and encryption&lt;br /&gt;
## Practices for all software layers&lt;br /&gt;
### Data validation&lt;br /&gt;
### Garbage collection issues&lt;br /&gt;
### Classes and method scoping&lt;br /&gt;
### Use of secrets&lt;br /&gt;
### Inner class issues&lt;br /&gt;
### Over/underflow and boxing issues&lt;br /&gt;
# Tools&lt;br /&gt;
## Code review tool&lt;br /&gt;
## Data flow tool&lt;br /&gt;
## Pen-testing tool&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Due to the lack of time, we will only show tool usage (no practical exercises with the audience).&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 - What Developers Should Know on Web Application Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Sebastien Deleersnyder and Martin Knobloch&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4 h&lt;br /&gt;
To be scheduled on Tuesday.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Application security is an essential component of any successful project; this includes web applications, open source PHP applications, web services and proprietary business web sites.&lt;br /&gt;
Web application security education and awareness is needed throughout the entire development and deployment organization. Each area and level of development or deployment organizations have specific needs and requirements regarding web application security education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience.&lt;br /&gt;
&lt;br /&gt;
The OWASP Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences.&lt;br /&gt;
This Education Track provides in a 4 hour session covering what developers should know on web application security. It starts with an explanation of web application security and why it is important. Then the OWASP Top 10 is used to explain the nastiest vulnerabilities and how these can be prevented or re mediated. A secure coding initiative must deal with all stages of a program’s life cycle. Secure web applications are only possible when a secure SDLC is used. The SDLC is explained from the standpoint of people, processes and tools. Particularly for developers good secure development practices are covered in a separate topic. Finally the track finishes with an exhaustive list of web application security resources for web application developers.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web application developers who are unaware there are security issues with contemporary web applications. No prior knowledge of web application security is assumed nor necessary. This track is independent of the coding language or web frameworks used; like PHP, JSF, Java EE or .NET. We must realize that web application developers are only one link - albeit an important one - of the chain that represents the security of a web application. This track aims to make that link as secure as possible, given the constraint of 4 hours. Another important aspect is that web application security should be tailored to the risk profile of an organization and the specific development environment of that organization.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
The challenge is to cover web application security in 4 hours to a web application developer. This is presented in such a way that the developers will be able to recognize and correct web application vulnerabilities in their projects. &lt;br /&gt;
&lt;br /&gt;
* [[Education Module Why WebAppSec Matters|Why WebAppSec matters]] (20 min) ([http://www.owasp.org/images/5/58/Education_Module_Why_WebAppSec_Matters.ppt direct link])&lt;br /&gt;
:This part is the introduction of the track. It identifies the current security problems with web applications. During the introduction a definition of web application security is given. Trends that are influencing the current state of web application insecurity are also explained.&lt;br /&gt;
:*What goes wrong&lt;br /&gt;
:*WebAppSec Defined&lt;br /&gt;
:*Current trends&lt;br /&gt;
* [[Education_Module_OWASP_Top_10_Introduction_and_Remedies|OWASP Top 10 Introduction &amp;amp; Remedies]] (90 min) ([http://www.owasp.org/images/b/b8/Education_Module_OWASP_Top_10_Introduction_and_Remedies.ppt direct link])&lt;br /&gt;
:The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most common web application security vulnerabilities. The Top 10 provides basic methods to protect against these vulnerabilities.&lt;br /&gt;
:*[[Education Module Cross Site Scripting (XSS)|Cross Site Scripting (XSS)]]&lt;br /&gt;
:*Injection Flaws&lt;br /&gt;
:*Malicious File Execution&lt;br /&gt;
:*Insecure Direct Object Reference&lt;br /&gt;
:*Cross Site Request Forgery (CSRF)&lt;br /&gt;
:*Information Leakage and Improper Error Handling&lt;br /&gt;
:*Broken Authentication and Session Management&lt;br /&gt;
:*Insecure Cryptographic Storage&lt;br /&gt;
:*Insecure Communications&lt;br /&gt;
:*Failure to Restrict URL Access&lt;br /&gt;
*[[Education Module Embed within SDLC|Embed within SDLC]] (People, Processes &amp;amp; Tools) (20 min) ([http://www.owasp.org/images/f/f2/Education_Module_Embed_within_SDLC.ppt direct link])&lt;br /&gt;
:There is no silver bullet when it comes to securing web applications. This problem has to be addressed from different angles, covering the involved actors, processes: development as well as deployment and Technologies.&lt;br /&gt;
:*People Awareness and Education&lt;br /&gt;
:*Development WebAppSec Controls&lt;br /&gt;
:*Deployment WebAppSec Controls&lt;br /&gt;
:*WebAppSec Tools&lt;br /&gt;
*[[Education Module Good Secure Development Practices|Good Secure Development Practices]] (70 min) ([http://www.owasp.org/images/5/57/Education_Module_Good_Secure_Development_Practices.ppt direct link])&lt;br /&gt;
:Next to the Top 10 remedies this module provides some good secure development practices from the OWASP Guide, covering e.g.&lt;br /&gt;
:*Validating User Input &lt;br /&gt;
:*Authentication&lt;br /&gt;
:*Authorization&lt;br /&gt;
:*Session Management&lt;br /&gt;
:*Using Interpreters&lt;br /&gt;
:*Crypto&lt;br /&gt;
:*Catching Errors&lt;br /&gt;
:*File System&lt;br /&gt;
:*Configuration&lt;br /&gt;
:*Web 2.0&lt;br /&gt;
*[[Education Module Testing for Vulnerabilities|Testing for Vulnerabilities]] (20 min) ([http://www.owasp.org/images/4/49/Education_Module_Testing_for_Vulnerabilities.ppt direct link])&lt;br /&gt;
:One important aspect is to test for application vulnerabilities. During this short module an introduction is provided together with some WebGoat test cases.&lt;br /&gt;
:*Testing for application vulnerabilities&lt;br /&gt;
:*The OWASP Testing Guide&lt;br /&gt;
:*WebGoat demonstrated&lt;br /&gt;
*[[Education Module Good WebAppSec Resources|Good WebAppSec Resources]] (not limited to OWASP) (10 min) ([http://www.owasp.org/images/f/fe/Education_Module_Good_WebAppSec_Resources.ppt direct link])&lt;br /&gt;
:This 4 hour education track in only the beginning of your journey. Web application security is a moving target. New vulnerabilities and threats are discovered regularly. Web application security controls are becoming mature. The following resources should provide you with enough pointers to serve both as reference and for further research.&lt;br /&gt;
:*Hard Copy&lt;br /&gt;
:*Web Sites&lt;br /&gt;
:*Mailing lists&lt;br /&gt;
:*Blogs&lt;br /&gt;
*Roundup (10 min)&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
No specific prerequisites.&lt;br /&gt;
&lt;br /&gt;
== Linux Software Exploitation ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Nam Nguyen&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
2 days&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course is a primer into software exploitation on the Linux environment. The course assumes only basic understanding of the Linux commands, and C programming with the standard library. It explains the computer architecture, assembly language then moves on to three basic classes of security bug: buffer overflow, format string, and race condition and methods to take advantage of them. Throughout the course, various examples are introduced with increasing difficulty so that participants will naturally realize the art of software exploitation for themselves.&lt;br /&gt;
&lt;br /&gt;
This course does not discuss about shell coding. Except on one example where provided shell code is used as an illustration, all other challenges require only good analysis and calculation.&lt;br /&gt;
&lt;br /&gt;
The course is conducted as a workshop with heavy interaction between participants and instructor. There will not be any presentation slide. Participants are to take note during the course.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Software developers, system administrators, security engineers with some experience in Linux and C programming.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
# Computer architecture&lt;br /&gt;
# Assembly language&lt;br /&gt;
# Buffer overflow&lt;br /&gt;
# Format string&lt;br /&gt;
# Race condition&lt;br /&gt;
# Techniques&lt;br /&gt;
## Overwrite critical variable&lt;br /&gt;
## Overwrite return address&lt;br /&gt;
## Return to .text&lt;br /&gt;
## Return to libc&lt;br /&gt;
## Overwrite .dtors&lt;br /&gt;
## Overwrite .got&lt;br /&gt;
## Overwrite .bss, functors&lt;br /&gt;
## By pass Advanced Space Layout Randomization&lt;br /&gt;
# Tools of the trade: IDA, GDB, and Python&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop with VMWare Player or equivalent. An VM image will be provided.&lt;br /&gt;
&lt;br /&gt;
== Classic ASP Security using OWASP tools ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Juan Carlos Calderon&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day &lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Classic ASP 2.0 and 3.0 applications are still largely used as this technology is more than 10 years old and was largely used. there are thousands of sites on the wild that need guidance on the security arena. This is where OWASP can come up and provide help for “making the Web a better place”.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Classic ASP Developers, Application Architects, people with basic ASP knowledge?&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
*Secure programming on ASP using [[ESAPI|OWASP ESAPI]]&lt;br /&gt;
*Auditing ASP code with [[:Category:OWASP_Code_Review_Project|Code Review Project]] checklist&lt;br /&gt;
*Implementing [[:Category:OWASP_Stinger_Project|OWASP Stinger]] protection for Classic ASP &lt;br /&gt;
*ASP specific Best Practices to protect ASP applications.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
None. Keep posted for changes on the table of contents and course specifics.&lt;br /&gt;
&lt;br /&gt;
== Web Application Assessments ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Vicente Aguilera Diaz&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
As in the physical world, the &amp;quot;professionals&amp;quot; attackers spend most of their time to analysing its objective and try to gather as much information as possible about it. The more information becomes available and is more detailed and accurate, the attack is more likely to succeed.&lt;br /&gt;
&lt;br /&gt;
The aim of this course is to identify patterns and tools to perform this analysis (step prior to the attack), and is supplemented by a case study on a practical application.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Software developers, security consultants, system administrators and people loving security.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
# Introduction&lt;br /&gt;
# Web Application Discovery&lt;br /&gt;
# Gathering information on the target web application&lt;br /&gt;
## Search Engines&lt;br /&gt;
## Interaction with external entities and information services&lt;br /&gt;
## Analysis of existing information in the web application (public information, information leaks, causing errors, etc.).&lt;br /&gt;
# Knowing / Understand the target&lt;br /&gt;
## Identifying characteristics (technologies, platforms, user profiles, features, etc.).&lt;br /&gt;
## Analysis of infrastructure components: databases, Web servers, application servers, authentication servers, etc.).  Detection and identification.&lt;br /&gt;
## Identification of the exposition area&lt;br /&gt;
# Analysis of attack vectors and vulnerabilities exploitation&lt;br /&gt;
# Case Study&lt;br /&gt;
## Assessment of an webmail application &lt;br /&gt;
## Vulnerability exploitation: IMAP / SMTP Injection&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop.&lt;br /&gt;
&lt;br /&gt;
== Hacking Owasp Orizon Project v1.0 ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Paolo Perego&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
In the course it will be presented Owasp Orizon v1.0 framework. The major APIs will be fully explained and it will be built a simple scanning tool using the Orizon framework.&lt;br /&gt;
&lt;br /&gt;
The course goal is to let people fully understand Orizon internals and let people understand how to use the framework in a real world.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Security specialist, code reviewers and curious developers&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* Owasp Orizon Internals&lt;br /&gt;
** Translation engine&lt;br /&gt;
** Owasp Orizon XML project&lt;br /&gt;
*** XML used in writing security checks&lt;br /&gt;
*** XML used in translation phase&lt;br /&gt;
** Static analysis engine&lt;br /&gt;
** Crawling engine&lt;br /&gt;
** Reporting engine&lt;br /&gt;
* Create a simple tool using Orizon&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
People have to bring their own laptop with latest Owasp Orizon version, J2SE 1.6 or later and a Java IDE (e.g. eclipse) is also feasible.&lt;br /&gt;
&lt;br /&gt;
== Securing WebGoat with ModSecurity  ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Stephen Craig Evans&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
ModSecurity, normally a tool of the network security group, has capabilities that can allow a  software security specialist with programming skills to mitigate business logic flaws and other  vulnerabilities that are out-of-reach of basic blacklists.&lt;br /&gt;
&lt;br /&gt;
This 4 hour course covers the highlights of the Summer of Code 2008 project, &amp;quot;Securing WebGoat using  ModSecurity&amp;quot; (please see  https://www.owasp.org/index.php/Category:OWASP_Securing_WebGoat_using_ModSecurity_Project and the  project wiki).&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
* Users of ModSecurity that want to learn how it can be leveraged beyond the basic rule sets in order to mitigate vulnerabilities in areas such as authentication, AJAX, and output sanitization&lt;br /&gt;
* Web application specialists, especially pentesters, who want to learn how ModSecurity can offer an additional remedial solution to customers when the application cannot be touched&lt;br /&gt;
* Curious people that are wondering what the hell this project is about&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* ModSecurity basics&lt;br /&gt;
* WebGoat overview&lt;br /&gt;
* A walkthrough of the &amp;quot;Securing WebGoat using ModSecurity&amp;quot; Summer of Code 2008 project&lt;br /&gt;
* Mitigating WebGoat vulnerabilities using the ModSecurity core rule set&lt;br /&gt;
* Using ModSecurity's Lua scripting language:&lt;br /&gt;
** For its programming capabilities (including re-building the Lua library to include 3rd party functionality)&lt;br /&gt;
** To implement configuration files&lt;br /&gt;
** For global persistence&lt;br /&gt;
** And much, much, more...&lt;br /&gt;
* Using ModSecurity's Javascript injection (prepend and append):&lt;br /&gt;
** To substitute/override/extend existing Javascript functions&lt;br /&gt;
** To enhance the user experience when implementing a ModSecurity solution on the back end such as an authentication mechanism &lt;br /&gt;
* Using ModSecurity's session collection, Lua script, and Javascript injection together to mitigate almost any vulnerability&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Demos (including strategy and implementation) of the most interesting lesson solutions will be shown.&lt;br /&gt;
&lt;br /&gt;
== How to Win AppSec Hacking Contests and Deploy Better Web Applications ==&lt;br /&gt;
&lt;br /&gt;
'''Instructors'''&lt;br /&gt;
&lt;br /&gt;
Lann Martin and Lebbeous Fogle-Weekley - ''winners of the CTF contest at OWASP AppSec NYC '08''&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4 hours&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This class will demonstrate how an attacker approaches potentially&lt;br /&gt;
vulnerable web applications, taking advantage of both poor server&lt;br /&gt;
configuration and poor application implementation to discover and exploit&lt;br /&gt;
vulnerabilities of several types.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web application developers and penetration testers of intermediate&lt;br /&gt;
skill.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
''This table of contents is a work in progress''&lt;br /&gt;
* The trouble with verbose error messages&lt;br /&gt;
* The right way and the wrong way to escape input to prevent SQL injection&lt;br /&gt;
* The right way and the wrong way to encode output to prevent XSS&lt;br /&gt;
* More bad practices to avoid&lt;br /&gt;
* More good practices to maintain&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop to participate in attacks on sample&lt;br /&gt;
web applications.  Firefox is the preferred browser for exploiting web&lt;br /&gt;
applications.  Automated scanning tools are out of scope for this class.&lt;br /&gt;
&lt;br /&gt;
== Uncovering WebScarab's Secret Treasures ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Rogan Dawes&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
OWASP WebScarab has a lot of hidden features that probably no one but the author really knows about. This in depth hands on session will show delegates how to access these features, and how to use them to their full potential.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Application reviewers, developers&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* Using the spider&lt;br /&gt;
* Manual Request Transforms&lt;br /&gt;
* What is the XSS/CRLF plugin, and how does it work?&lt;br /&gt;
* Using the Fuzzer&lt;br /&gt;
* Comparing Responses&lt;br /&gt;
* Searching WebScarab history&lt;br /&gt;
* Exploring the Beanshell&lt;br /&gt;
** Writing Proxy Intercept scripts&lt;br /&gt;
** Writing Script Manager Scripts&lt;br /&gt;
** Writing other scripts&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop&lt;br /&gt;
&lt;br /&gt;
== Leading the Development of Secure Applications ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Arshan Dabirsiaghi, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
In this one-day management session you'll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their applications's lifecycle.&lt;br /&gt;
&lt;br /&gt;
== Building Secure Rich Internet Applications ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Arshan Dabirsiaghi, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure.  this one day training addresses the special issues that arise in this type of application development.&lt;br /&gt;
&lt;br /&gt;
== Building Secure Web Services ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
2 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures.  this session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identify servers and related software.  Many enterprises are currently developing new Web Services and/or adding and acquiring Web Services functionality into existing applications -- now is the time to build security into the system.&lt;br /&gt;
&lt;br /&gt;
== Ajax Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Brad Causey&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This course will provide an introductory to AJAX, its inherent security issues, how to detect them, and how to resolve them.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web Application Security Professionals&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents&lt;br /&gt;
'''&lt;br /&gt;
* Introduction to AJAX&lt;br /&gt;
* Security Issues with architecture&lt;br /&gt;
* Toolkits&lt;br /&gt;
* Toolkit Security Concerns&lt;br /&gt;
* Bridges and Issues&lt;br /&gt;
* Attacking AJAX&lt;br /&gt;
* Defending AJAX&lt;br /&gt;
* Securing the Code&lt;br /&gt;
* Best Practices&lt;br /&gt;
* Other Issues and Concerns&lt;br /&gt;
* Q and A&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
Please bring your own laptop with your choice of web proxy and browser installed if you wish to participate. Participation is optional.&lt;/div&gt;</summary>
		<author><name>Lebbeous</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Training_(Courses_to_be_Approved)&amp;diff=42138</id>
		<title>OWASP EU Summit 2008 Training (Courses to be Approved)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_Training_(Courses_to_be_Approved)&amp;diff=42138"/>
				<updated>2008-10-06T15:54:58Z</updated>
		
		<summary type="html">&lt;p&gt;Lebbeous: Added 'Practical Penetration Testing: ...'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Upon detail completion and board approval courses will be moved towards the main agenda.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Source Code Review==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Eoin Keary and Daniel Cuthbert (TBC)&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
0.5 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
An introduction to secure code review from an OWASP standpoint. Covering how to approach the review, tips and leading practice on how to get the best from a source code review. A look at the OWASP tools that support the code review guide.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
Anyone that would like to learn more about secure code review.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Advanced Phishing and Social Engineering Training==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Joshua Perrymon&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
This class is designed to illustrate hands-on methods used in the real world attacking the human layer. This includes a focus on spear-phishing using the newly introduced OWASP phishing framework (LUNKER). Attendees will identify target emails using a variety of methods, identify potential phish sites, create a spoofed email and send the attack all in a locally ran test environment in Vmware or LiveCD.&lt;br /&gt;
&lt;br /&gt;
Upon completion of this course, attendees will have an in-depth understanding of the latest techniques used to perform these type of attacks. The class will also include additional social engineering attack methods such as impersonation, authority attacks, pre-text attacks, and much more.  Advanced topics such as Email Payloads and  2nd Factor token MITM attacks will be covered as well.&lt;br /&gt;
&lt;br /&gt;
1. Introduction to Social Engineering&lt;br /&gt;
&lt;br /&gt;
2. Understanding the Human Aspect of Security&lt;br /&gt;
&lt;br /&gt;
3. Review of aggressively vertical hacking methodology&lt;br /&gt;
&lt;br /&gt;
4. Analysis of attack trending over the years (Up the OSI Model)&lt;br /&gt;
&lt;br /&gt;
5. Review of public Social Engineering Attacks in the media&lt;br /&gt;
&lt;br /&gt;
6. Hands on: Spear Phishing Demo using the Lunker Framework&lt;br /&gt;
     a. Understanding the Social Engineering Scope of work&lt;br /&gt;
     b. Setup Client Info&lt;br /&gt;
     c. Gather Email addresses/targets&lt;br /&gt;
     d. Identify potential phishing sites&lt;br /&gt;
     e. Creation of spoofed emails&lt;br /&gt;
         i. Custom footers&lt;br /&gt;
         ii. Attack Scenarios&lt;br /&gt;
         iii. Email header options&lt;br /&gt;
&lt;br /&gt;
f. Test Environment: Review the spoofed email and phishing site&lt;br /&gt;
&lt;br /&gt;
g. Send attack&lt;br /&gt;
&lt;br /&gt;
h. Monitor: Discuss steps to take at this point once the users send in credentials.&lt;br /&gt;
&lt;br /&gt;
i. Advanced Phishing Attacks: Recon, XSS/CSRF/Browser Exploit/Trojan payloads&lt;br /&gt;
&lt;br /&gt;
j. MITM Attacks on 2-factor Authentication&lt;br /&gt;
&lt;br /&gt;
k. Summary&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here. (i.e. bring your own laptop)&lt;br /&gt;
&lt;br /&gt;
== OWASP ESAPI ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Jeff Williams, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here. (i.e. bring your own laptop)&lt;br /&gt;
&lt;br /&gt;
== Web Services and SOA Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
2 days&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here. (i.e. bring your own laptop)&lt;br /&gt;
&lt;br /&gt;
== Advanced Web Application Security Testing ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Michael Coates, Aspect Security&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
2 days&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here. (i.e. bring your own laptop)&lt;br /&gt;
&lt;br /&gt;
== Uncovering WebScarab's Secret Treasures ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Rogan Dawes&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 day.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
OWASP WebScarab has a lot of hidden features that probably no one but the author really knows about. This in depth hands on session will show delegates how to access these features, and how to use them to their full potential.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Application reviewers, developers&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
* Using the spider&lt;br /&gt;
* Manual Request Transforms&lt;br /&gt;
* What is the XSS/CRLF plugin, and how does it work?&lt;br /&gt;
* Using the Fuzzer&lt;br /&gt;
* Comparing Responses&lt;br /&gt;
* Searching WebScarab history&lt;br /&gt;
* Exploring the Beanshell&lt;br /&gt;
** Writing Proxy Intercept scripts&lt;br /&gt;
** Writing Script Manager Scripts&lt;br /&gt;
** Writing other scripts&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop&lt;br /&gt;
&lt;br /&gt;
== Testing Guide Training ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Matteo Meucci, Giorgio Fedon.&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4h.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Software developers, security consultants, auditors.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop.&lt;br /&gt;
&lt;br /&gt;
== AJAX Security ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Brad Causey&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
1 Day&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Additional Details and summary to follow...&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web Application Security Professionals&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
Details to come&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please bring your own laptop with your choice of web proxy and browser installed if you wish to participate. Participation is optional.&lt;br /&gt;
&lt;br /&gt;
== Practical Penetration Testing: Think Like an Attacker to Stop Attacks ==&lt;br /&gt;
&lt;br /&gt;
'''Instructors'''&lt;br /&gt;
&lt;br /&gt;
Lann Martin and Lebbeous Fogle-Weekley&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
4 hours&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
This class will demonstrate how an attacker approaches potentially&lt;br /&gt;
vulnerable web applications, taking advantage of both poor server&lt;br /&gt;
configuration and poor application implementation to discover and exploit&lt;br /&gt;
vulnerabilities of several types.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Web application developers and penetration testers of intermediate&lt;br /&gt;
skill.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
''This table of contents is a work in progress''&lt;br /&gt;
* The trouble with verbose error messages&lt;br /&gt;
* The right way and the wrong way to escape input to prevent SQL injection&lt;br /&gt;
* The right way and the wrong way to encode output to prevent XSS&lt;br /&gt;
* More bad practices to avoid&lt;br /&gt;
* More good practices to maintain&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Bring your own laptop to participate in attacks on sample&lt;br /&gt;
web applications.  Firefox is the preferred browser for exploiting web&lt;br /&gt;
applications.  Automated scanning tools are out of scope for this class.&lt;br /&gt;
&lt;br /&gt;
== Course Name {template} ==&lt;br /&gt;
&lt;br /&gt;
'''Instructor'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Duration'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Audience'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Table of Contents'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here.&lt;br /&gt;
&lt;br /&gt;
'''Course Specifics'''&lt;br /&gt;
&lt;br /&gt;
Please enter the text here. (i.e. bring your own laptop)&lt;/div&gt;</summary>
		<author><name>Lebbeous</name></author>	</entry>

	</feed>