<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Maarten</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Maarten"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Maarten"/>
		<updated>2026-04-23T23:14:10Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_March_19th,_2015&amp;diff=189780</id>
		<title>Netherlands March 19th, 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_March_19th,_2015&amp;diff=189780"/>
				<updated>2015-02-17T07:22:07Z</updated>
		
		<summary type="html">&lt;p&gt;Maarten: Fixed typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;[[Netherlands | OWASP Netherland Wiki]] &lt;br /&gt;
;[[Netherlands_Previous_Events_2014 | All OWASP NL Events 2015]]&lt;br /&gt;
= March 19th, 2015 =&lt;br /&gt;
TBD&lt;br /&gt;
== Venue ==&lt;br /&gt;
;Kroonjuweel&lt;br /&gt;
;:DDK E0.02&lt;br /&gt;
;Duivendrechtsekade 36-38&lt;br /&gt;
;1096 AH Amsterdam&lt;br /&gt;
&lt;br /&gt;
[http://www.hva.nl/over-de-hva/locaties/content/hva-locaties/kroonjuweel.html Click here for directions, HvA]&lt;br /&gt;
&lt;br /&gt;
==Programme:==&lt;br /&gt;
:18:30 - 19:00 Registration &amp;amp; Sandwiches&lt;br /&gt;
:19:00 - 19:15 OWASP Netherland and Foundation Updates&lt;br /&gt;
:19:15 - 20:00 First talk&lt;br /&gt;
:20:00 - 20:15 Break&lt;br /&gt;
:20:15 - 21:00 Second talk&lt;br /&gt;
:20:45 - 21:30 Networking&lt;br /&gt;
==Presentations==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Maarten</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=160960</id>
		<title>BeNeLux OWASP Day 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BeNeLux_OWASP_Day_2013&amp;diff=160960"/>
				<updated>2013-10-17T13:58:26Z</updated>
		
		<summary type="html">&lt;p&gt;Maarten: Fixed typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[Image:Bnl13header-v.1.0.png]]&amp;lt;br&amp;gt;&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- First tab --&amp;gt;&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
=== Welcome to OWASP BeNeLux 2013  ===&lt;br /&gt;
&lt;br /&gt;
'''Registration is now open!'''&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== News ====&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed trainers for Trainingday ====&lt;br /&gt;
{{#switchtablink:Trainingday| &amp;lt;p&amp;gt;&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Confirmed speakers Conference ====&lt;br /&gt;
{{#switchtablink:Conferenceday| &amp;lt;p&amp;gt;&lt;br /&gt;
* Dick Berlijn (ex Chief of Defence NL)&lt;br /&gt;
* Jan Joris Vereijken (ING)&lt;br /&gt;
* Tom Van Goethem (University Leuven)&lt;br /&gt;
* Jerome Nokin (Verizon Business)&lt;br /&gt;
* Nick Nikiforakis (University Leuven)&lt;br /&gt;
* Fakos Alexios and Jan Philipp (n.runs AG)&lt;br /&gt;
more to be announced&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== The OWASP BeNeLux Program Committee ====&lt;br /&gt;
*Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium&lt;br /&gt;
*Martin Knobloch / Ferdinand Vroom, OWASP Netherlands&lt;br /&gt;
*Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Tweet! ===&lt;br /&gt;
Event tag is [http://twitter.com/#search?q=%23owaspbnl13 #owaspbnl13]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2013&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Second tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
==== OWASP BeNeLux training day and conference are free! ==== &lt;br /&gt;
&lt;br /&gt;
=== Registration is not now open: ===&lt;br /&gt;
 &lt;br /&gt;
[http://owaspbenelux2013.eventbrite.com/ http://www.owasp.org/images/7/77/Buttoncreate.png]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
To support the OWASP organisation, consider to become a member, it's only US$50!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
Check out the [[Membership]] page to find out more. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Third tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Venue =&lt;br /&gt;
&lt;br /&gt;
=== Venue is  ===&lt;br /&gt;
&lt;br /&gt;
''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Parking &amp;amp; roadmap''':&lt;br /&gt;
&lt;br /&gt;
There is a public parking close to the conference venue.&lt;br /&gt;
&lt;br /&gt;
Roadmap and parking: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Hotels nearby''': &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fourth tab - currently removed&lt;br /&gt;
&lt;br /&gt;
= Trainingday =&lt;br /&gt;
&lt;br /&gt;
==== Trainingday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
The training room is: &lt;br /&gt;
TBD&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Time !! Description !! Room 1 !! Room 2 !! Room 3 !! Room 4&lt;br /&gt;
|-&lt;br /&gt;
| 08h30 - 9h30&lt;br /&gt;
| colspan=&amp;quot;5&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white;&amp;quot; | ''Registration''&lt;br /&gt;
|-&lt;br /&gt;
| 09h30 - 11h00 || Training&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
| rowspan=&amp;quot;7&amp;quot; style=&amp;quot;width:100px;&amp;quot; | tbd&lt;br /&gt;
|-&lt;br /&gt;
| 11h00 - 11h30 ||  ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 11h30 - 13h00 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 13h00 - 14h00 || ''Lunch''&lt;br /&gt;
|-&lt;br /&gt;
| 14h00 - 15h30 || Training&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 16h00 || ''Coffee Break''&lt;br /&gt;
|-&lt;br /&gt;
| 16h00 - 17h30 || Training&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Fifth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Conferenceday =&lt;br /&gt;
&lt;br /&gt;
==== Conferenceday, November 29th  ====&lt;br /&gt;
&lt;br /&gt;
==== Location ====&lt;br /&gt;
TBD (for details, check the {{#switchtablink:Venue|Venue}} tab)&lt;br /&gt;
&lt;br /&gt;
==== Agenda ==== &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! width=&amp;quot;90pt&amp;quot; | Time&lt;br /&gt;
! width=&amp;quot;130pt&amp;quot; | Speaker !! Topic&lt;br /&gt;
|- &lt;br /&gt;
| 09h00 - 10h00&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center; background: grey; color: white&amp;quot; | ''Registration''&lt;br /&gt;
|- &lt;br /&gt;
| 10h00 - 10h15 || OWASP Benelux Organization || Welcome &lt;br /&gt;
|-&lt;br /&gt;
| 10h15 - 10h30 || TBD || OWASP update &lt;br /&gt;
|-&lt;br /&gt;
| 10h30 - 11h10 || TBD || ''' Title '''&amp;lt;br&amp;gt;''Abstract:'' &lt;br /&gt;
|-&lt;br /&gt;
| 11h10 - 11h50 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 11h50 - 12h30 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 12h30 - 13h30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Lunch'' &lt;br /&gt;
|-&lt;br /&gt;
| 13h30 - 14h10 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h10 - 14h50 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 14h50 - 15h30 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 15h30 - 15h50&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;text-align: center;background: grey; color: white&amp;quot; | ''Break'' &lt;br /&gt;
|-&lt;br /&gt;
| 15h50 - 16h30 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 16h30 - 17h10 || TBD || ''' Title ''' &amp;lt;br&amp;gt;''Abstract:''&lt;br /&gt;
|-&lt;br /&gt;
| 17h10 - 17h50 || TBD|| '''Panel Discussion about...'''&lt;br /&gt;
|-&lt;br /&gt;
| 17h50 - 18h00 || OWASP Benelux 2013 organization || '''Closing Notes'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;'JanPhilipp&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Getting a Handle on SharePoint Security Complexity, by Jan Philipp (Solutions Consultant Security, n.runs,) and Alexios Fakos (Principal IT Security Consultant, n.runs) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
This presentation’s main goal is to provide decision makers, architects, administrators and developers with a comprehensive SharePoint security overview. We will introduce a SharePoint security model applicable to SharePoint versions 2010 and 2013. Then we will take a closer look at the use of different types of security principals and their effective use. This will be followed by covering security aspects when implementing and extending SharePoint to meet business needs and will be emphasized by showcasing common security pitfalls with examples throughout the presentation. This will be demonstrated with security down to the “nitty-gritty” details based on actual use cases and tips and pitfalls that have been encountered during security assessments and implementation of SharePoint solutions.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Jan Philipp''' (MCT since 1989, MCITP, MCSE) works as a security consultant at n.runs, where he is responsible for design and implementation security assessments of complex global SharePoint infrastructures and solutions for major German and international companies. He has been involved with SharePoint technologies from their inception with Digital Dashboards throughout their many development changes (TeamSpaces, MOSS etc.) to the present day SharePoint and SharePoint Live versions.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Alexios Fakos''' (CRISC, CSSLP) began his career in development as a Software Engineer back in 1999. After seven years of inspired insights in the software industry he joined n.runs to be part of the security team. Alexios is leading n.runs SDL services and he is since 2008 part of the German OWASP chapter. Alexios held presentations at OWASP AppSec US and Germany.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tom Van Goethem''' is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask), by Nick Nikiforakis (Postdoctoral Researcher, University of Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
Billions of users browse the web on a daily basis,&lt;br /&gt;
and there are single websites that have reached over one billion user&lt;br /&gt;
accounts. In this environment, the ability to track users and their online habits can&lt;br /&gt;
be very lucrative for advertising companies, yet very intrusive for the privacy of users.&lt;br /&gt;
&lt;br /&gt;
In this talk, we are going to describe web-based device fingerprinting, i.e., the ability&lt;br /&gt;
to tell users apart, without the use of cookies or any other client-side identifiers. We&lt;br /&gt;
will explain how device fingerprinting works, who is using, for what reason, and how people&lt;br /&gt;
are trying to defend against it today. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Nikiforakis''' is a Postdoctoral Researcher at KU Leuven in Belgium. Nick's interests lie&lt;br /&gt;
in the analysis of online ecosystems from a security and privacy perspective and he has&lt;br /&gt;
published his work in top conferences of his field. More information about him can be found&lt;br /&gt;
on his personal page: http://www.securitee.org .&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div id=&amp;quot;TomVanGoethem&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
=== Remote Code Exection in WordPress: an analysis, by Tom Van Goethem (PhD University Leuven) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
With over 13 million downloads, WordPress is one of the most popular open source blog platforms and content management systems. One of its key features is the installation of plugins. These are developed by third parties, but WordPress has to maintain its legacy codebase in order to remain compatible with these plugins. As this codebase makes use of unsafe functions, vulnerabilities may arise, affecting thousands websites - if not more. This presentation will focus on a vulnerability that has been present in WordPress versions up to September 2013. This vulnerability, which may lead to Remote Code Execution, was found by a simple combination of two publicly known elements: PHP Object Injection and unexpected behaviour of MySQL regarding Unicode characters.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Van Goethem is passionate about web security. After getting a master's degree of Applied Informatics, he enrolled in a PhD at the University of Leuven. As a student with a chronic drinking problem, he still found some time to hunt bugs for fun (and profit).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Body Armor for Binaries, by Asia Slowinska (Vrije Universiteit Amsterdam) ===&lt;br /&gt;
''Abstract:''&amp;lt;br&amp;gt;&lt;br /&gt;
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the pro- grams’ source or symbol tables. We show that BinArmor is able to stop real attacks—including the recent non- control data attack on Exim. Moreover, we did not in- cur a single false positive in practice. On the downside, the current overhead of BinArmor is high—although no worse than competing technologies like taint analysis that do not catch attacks on non-control data. Specifi- cally, we measured an overhead of 70% for gzip, 16%- 180% for lighttpd, and 190% for the nbench suite.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
''Bio:''&amp;lt;br&amp;gt;&lt;br /&gt;
I am a postdoctoral researcher in the System and Network Security group at the Vrije Universiteit Amsterdam, under the guidance of Prof. dr. ir. Herbert Bos.&amp;lt;br&amp;gt;&lt;br /&gt;
I obtained my PhD from the Vrije Universiteit Amsterdam. My dissertation Using information flow tracking to protect legacy binaries was completed under the supervision of Prof. dr. ir. Herbert Bos, while my copromotor was Prof. dr. ir. Henri E. Bal.&amp;lt;br&amp;gt;&lt;br /&gt;
During my PhD studies, I interned twice with Microsoft Research Cambridge, where I joined the Systems and Performance Group. I also spent few months interning with the Systems and Security Department at Institute for Infocomm Research in Singapore.&amp;lt;br&amp;gt;&lt;br /&gt;
My research focuses on developing techniques to automatically analyze and reverse engineer complex software that is available only in binary form. Further, I’ve been looking into mechanisms that proactively protect software from malicious activities. Currently, I am involved in a project on Reverse Engineering of binaries, known as Rosetta.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Sixth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Social Event =&lt;br /&gt;
&lt;br /&gt;
==== Social Event, November 28th ====&lt;br /&gt;
'''TBD'''&lt;br /&gt;
&amp;lt;!-- Seventh tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= CTF  =&lt;br /&gt;
&lt;br /&gt;
==== Capture the Flag! ====&lt;br /&gt;
&lt;br /&gt;
* Do you like puzzles? &lt;br /&gt;
* Do you like challenges? &lt;br /&gt;
* Are you a hacker?&lt;br /&gt;
&lt;br /&gt;
Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.  &lt;br /&gt;
&lt;br /&gt;
The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.&lt;br /&gt;
&lt;br /&gt;
All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools. &lt;br /&gt;
&lt;br /&gt;
So come, show off your skills, learn new tricks and above all have a good time at the CTF event. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Eighth tab --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sponsor =&lt;br /&gt;
&lt;br /&gt;
==== Become a sponsor of OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
==== Donate to OWASP BeNeLux ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;BeNeLux OWASP Day 2013&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promotion  ====&lt;br /&gt;
''Feel free to use the text below to promote our event!''&lt;br /&gt;
&lt;br /&gt;
We invite you to our next OWASP event: the '''BeNeLux OWASP Days 2013!'''&lt;br /&gt;
&lt;br /&gt;
Free your agenda on the 28th and 29th of November, 2013.&lt;br /&gt;
&lt;br /&gt;
The good news: free! No fee!&lt;br /&gt;
&lt;br /&gt;
The bad news: there are only 280 seats available (first register, first serve)!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Don't remove these two lines! --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Made possible by our {{#switchtablink:Sponsor|Sponsors}}====&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.pwc.com/|logo=PWC_log_resized.png}}&lt;br /&gt;
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]&lt;br /&gt;
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]&lt;br /&gt;
[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]&lt;br /&gt;
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]&lt;br /&gt;
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]&lt;br /&gt;
--!&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_BeNeLux_Archives]]&lt;/div&gt;</summary>
		<author><name>Maarten</name></author>	</entry>

	</feed>