<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Oshezaf</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Oshezaf"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Oshezaf"/>
		<updated>2026-05-06T14:19:32Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Core_rule_set_1.51.zip&amp;diff=223398</id>
		<title>File:Core rule set 1.51.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Core_rule_set_1.51.zip&amp;diff=223398"/>
				<updated>2016-11-13T20:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: A historic version of the OWASP ModSecurity Core Rule Set&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A historic version of the OWASP ModSecurity Core Rule Set&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181442</id>
		<title>Template:AppSec Israel 2014 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181442"/>
				<updated>2014-08-29T20:17:49Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;H1&amp;gt;Platinum Sponsors&amp;lt;/H1&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.akamai.com https://www.owasp.org/images/9/93/Akamai_logoIL.gif]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.checkpoint.com https://www.owasp.org/images/5/54/OWASP_IL_Sponsors_Checkpoint.jpg]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.idc.ac.il https://www.owasp.org/images/f/f1/OWASP_IL_Sponsors_IDC_New.JPG]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.ey.com https://www.owasp.org/images/3/34/EY-IL.jpg]  &lt;br /&gt;
| &amp;amp;nbsp;[http://www.imperva.com https://www.owasp.org/images/8/89/OWASP_IL_Sponsors_Imperva.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h3&amp;gt;Silver Sponsors&amp;lt;/h3&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.quotium.com https://www.owasp.org/images/5/56/LogoQuotium.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.appsec-labs.com https://www.owasp.org/images/2/24/AppSecLabsIL.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.komodosec.com/ https://www.owasp.org/images/0/03/Komodo-small.jpg]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.radware.com/ https://www.owasp.org/images/7/78/OWASP_IL_Sponsors_Radware.jpg] &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181441</id>
		<title>Template:AppSec Israel 2014 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181441"/>
				<updated>2014-08-29T20:17:09Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;H1&amp;gt;Platinum Sponsors&amp;lt;/H1&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.akamai.com https://www.owasp.org/images/9/93/Akamai_logoIL.gif]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.checkpoint.com https://www.owasp.org/images/5/54/OWASP_IL_Sponsors_Checkpoint.jpg]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.idc.ac.il https://www.owasp.org/images/f/f1/OWASP_IL_Sponsors_IDC_New.JPG]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.ey.com https://www.owasp.org/images/3/34/EY-IL.jpg]  &lt;br /&gt;
| &amp;amp;nbsp;[http://www.imperva.com https://www.owasp.org/images/8/89/OWASP_IL_Sponsors_Imperva.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.quotium.com https://www.owasp.org/images/5/56/LogoQuotium.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.appsec-labs.com https://www.owasp.org/images/2/24/AppSecLabsIL.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.komodosec.com/ https://www.owasp.org/images/0/03/Komodo-small.jpg]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.radware.com/ https://www.owasp.org/images/7/78/OWASP_IL_Sponsors_Radware.jpg] &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_Sponsors_Checkpoint.jpg&amp;diff=181440</id>
		<title>File:OWASP IL Sponsors Checkpoint.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_Sponsors_Checkpoint.jpg&amp;diff=181440"/>
				<updated>2014-08-29T20:16:31Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_Sponsors_Radware.jpg&amp;diff=181439</id>
		<title>File:OWASP IL Sponsors Radware.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_Sponsors_Radware.jpg&amp;diff=181439"/>
				<updated>2014-08-29T20:14:09Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: Oshezaf uploaded a new version of &amp;amp;quot;File:OWASP IL Sponsors Radware.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181437</id>
		<title>Template:AppSec Israel 2014 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181437"/>
				<updated>2014-08-29T20:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;H1&amp;gt;Platinum Sponsors&amp;lt;/H1&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.akamai.com https://www.owasp.org/images/9/93/Akamai_logoIL.gif]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.idc.ac.il https://www.owasp.org/images/f/f1/OWASP_IL_Sponsors_IDC_New.JPG]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.ey.com https://www.owasp.org/images/3/34/EY-IL.jpg]  &lt;br /&gt;
| &amp;amp;nbsp;[http://www.imperva.com https://www.owasp.org/images/8/89/OWASP_IL_Sponsors_Imperva.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.quotium.com https://www.owasp.org/images/5/56/LogoQuotium.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.appsec-labs.com https://www.owasp.org/images/2/24/AppSecLabsIL.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.komodosec.com/ https://www.owasp.org/images/0/03/Komodo-small.jpg]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.radware.com/ https://www.owasp.org/images/7/78/OWASP_IL_Sponsors_Radware.jpg] &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_Sponsors_Radware.jpg&amp;diff=181436</id>
		<title>File:OWASP IL Sponsors Radware.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_Sponsors_Radware.jpg&amp;diff=181436"/>
				<updated>2014-08-29T20:09:14Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181243</id>
		<title>Template:AppSec Israel 2014 Sponsors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:AppSec_Israel_2014_Sponsors&amp;diff=181243"/>
				<updated>2014-08-27T15:23:57Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;H1&amp;gt;Platinum Sponsors&amp;lt;/H1&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.akamai.com https://www.owasp.org/images/9/93/Akamai_logoIL.gif]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Gold Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.idc.ac.il https://www.owasp.org/images/f/f1/OWASP_IL_Sponsors_IDC_New.JPG]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.ey.com https://www.owasp.org/images/3/34/EY-IL.jpg]  &lt;br /&gt;
| &amp;amp;nbsp;[http://www.imperva.com https://www.owasp.org/images/8/89/OWASP_IL_Sponsors_Imperva.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.Checkmarx.com https://www.owasp.org/images/a/a2/Checkmarx.jpg]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;lt;h2&amp;gt;Silver Sponsors&amp;lt;/h2&amp;gt;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;[http://www.quotium.com https://www.owasp.org/images/5/56/LogoQuotium.png]&lt;br /&gt;
| &amp;amp;nbsp;[http://www.appsec-labs.com https://www.owasp.org/images/2/24/AppSecLabsIL.png]&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp; &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Oshezaf&amp;diff=173703</id>
		<title>User:Oshezaf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Oshezaf&amp;diff=173703"/>
				<updated>2014-04-28T19:07:23Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_IL_2008_01_Ofer_Shezaf.jpg|right|200px]]My name is Ofer Shezaf and I am an information security practitioner specializing in real time web application security, i.e. web application firewalls. At [http://www.xiom.com Xiom] we provide expert unbiased information about and 3rd party service to web application firewalls.&lt;br /&gt;
&lt;br /&gt;
Previously I led research and later product management at [http://www.breach.com Breach Security] and was responsible for Breach acquisition and support of [http://www.modsecurity.org ModSecurity], an open source application firewall. Prior to joining Breach, I specialized in national information security and worked with organizations such as the Israeli National Information Security Agency, the Israeli Intelligence Forces and the Israeli Nuclear Research Center specializing in areas such as information warfare &amp;amp; critical infrastructure protection. I work and live in Israel. &lt;br /&gt;
&lt;br /&gt;
I am also a very active member of the application security community:&lt;br /&gt;
* I lead [http://www.owasp.org/index.php/israel the OWASP Israeli Chapter] and I am a member of [https://www.owasp.org/index.php/Global_Chapter_Committee OWASP global chapter committee] which drives OWASP succesful chapters activity around the world.&lt;br /&gt;
* I am an officer in the [http://www.webappsec.org Web Application Security Consortium (WASC)] where Ilead the [http://whic.webappsec.org/ Web Hacking Incidents Database Project (WHID)]&lt;br /&gt;
* And lastly I pariticipate in [http://www.webappsec.org/projects/wafec/ The Web Application Firewall Evaluation Crietia (WAFEC)] and [http://www.owasp.org/index.php/Category:OWASP_on_the_Move_Project OWASP on the Move (OotM)] projects.&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2008_01_Ofer_Shezaf.jpg&amp;diff=173702</id>
		<title>File:OWASP IL 2008 01 Ofer Shezaf.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2008_01_Ofer_Shezaf.jpg&amp;diff=173702"/>
				<updated>2014-04-28T19:03:28Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: Oshezaf uploaded a new version of &amp;amp;quot;File:OWASP IL 2008 01 Ofer Shezaf.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Cheatsheet_Navigation&amp;diff=162266</id>
		<title>Template:Cheatsheet Navigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Cheatsheet_Navigation&amp;diff=162266"/>
				<updated>2013-11-01T23:13:17Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Cheat Sheets Project Homepage'''&lt;br /&gt;
* [[Cheat Sheets]]&lt;br /&gt;
&lt;br /&gt;
'''Developer Cheat Sheets (Builder)'''&lt;br /&gt;
* [[Authentication Cheat Sheet]]&lt;br /&gt;
* [[Business Logic Security Cheat Sheet]]&lt;br /&gt;
* [[Choosing and Using Security Questions Cheat Sheet]]&lt;br /&gt;
* [[Clickjacking Defense Cheat Sheet]]&lt;br /&gt;
* [[C-Based Toolchain Hardening Cheat Sheet]]&lt;br /&gt;
* [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
* [[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
* [[DOM based XSS Prevention Cheat Sheet]]&lt;br /&gt;
* [[Forgot Password Cheat Sheet]]&lt;br /&gt;
* [[HTML5 Security Cheat Sheet]]&lt;br /&gt;
* [[Input Validation Cheat Sheet]]&lt;br /&gt;
* [[JAAS Cheat Sheet]]&lt;br /&gt;
* [[Logging Cheat Sheet]]&lt;br /&gt;
* [[.NET Security Cheat Sheet]]&lt;br /&gt;
* [[OWASP Top Ten Cheat Sheet]]&lt;br /&gt;
* [[Password Storage Cheat Sheet]]&lt;br /&gt;
* [[Pinning Cheat Sheet]]&lt;br /&gt;
* [[Query Parameterization Cheat Sheet]]&lt;br /&gt;
* [[Ruby on Rails Cheatsheet]]&lt;br /&gt;
* [[REST Security Cheat Sheet]]&lt;br /&gt;
* [[Session Management Cheat Sheet]]&lt;br /&gt;
* [[SQL Injection Prevention Cheat Sheet]]&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* [[Unvalidated Redirects and Forwards Cheat Sheet]]&lt;br /&gt;
* [[User Privacy Protection Cheat Sheet]]&lt;br /&gt;
* [[Web Service Security Cheat Sheet]]&lt;br /&gt;
* [[XSS (Cross Site Scripting) Prevention Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
'''Assessment Cheat Sheets (Breaker)'''&lt;br /&gt;
* [[Attack Surface Analysis Cheat Sheet]]&lt;br /&gt;
* [[XSS Filter Evasion Cheat Sheet]]&lt;br /&gt;
* [[REST Assessment Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
'''Mobile Cheat Sheets'''&lt;br /&gt;
* [[IOS Developer Cheat Sheet]]&lt;br /&gt;
* [[Mobile Jailbreaking Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
'''OpSec Cheat Sheets (Defender)'''&lt;br /&gt;
* [[Virtual Patching Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
'''Draft Cheat Sheets'''&lt;br /&gt;
* [[Access Control Cheat Sheet]]&lt;br /&gt;
* [[Application Security Architecture Cheat Sheet]]&lt;br /&gt;
* [[PHP Security Cheat Sheet]]&lt;br /&gt;
* [[Secure Coding Cheat Sheet]]&lt;br /&gt;
* [[Secure SDLC Cheat Sheet]]&lt;br /&gt;
* [[Threat Modeling Cheat Sheet]]&lt;br /&gt;
* [[Web Application Security Testing Cheat Sheet]]&lt;br /&gt;
* [[Grails Secure Code Review Cheat Sheet]]&lt;br /&gt;
* [[IOS Application Security Testing Cheat Sheet]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=REST_Assessment_Cheat_Sheet&amp;diff=162265</id>
		<title>REST Assessment Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=REST_Assessment_Cheat_Sheet&amp;diff=162265"/>
				<updated>2013-11-01T23:12:00Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Related Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About RESTful Web Services =&lt;br /&gt;
&lt;br /&gt;
Web Services are an implementation of web technology used for machine to machine communication. As such they are used for Inter application communication, Web 2.0 and Mashups and by desktop and mobile applications to call a server. RESTful web services (often called simply REST) are a light weight variant of Web Services based on the RESTful design pattern. In practice RESTful web services utilizes HTTP requests that are similar to regular HTTP calls in contrast with other Web Services technologies such as SOAP which utilizes a complex protocol.&lt;br /&gt;
&lt;br /&gt;
= Key relevant properties of RESTful web services =&lt;br /&gt;
* Use of HTTP methods (GET, POST, PUT and DELETE) as the primary verb for the requested operation.&lt;br /&gt;
* None standard parameters specifications:&lt;br /&gt;
** As part of the URL&lt;br /&gt;
** In headers&lt;br /&gt;
* Structured parameters and responses using JSON or XML in a parameter values, request body or response body. Those are required to communicate machine useful information.&lt;br /&gt;
* Custom authentication and session management, often utilizing custom security tokens: this is needed as machine to machine communication does not allow for login sequences.&lt;br /&gt;
* Lack of formal documentation. A proposed standard for describing RESTful web services called WADL was never officially adapted. &lt;br /&gt;
&lt;br /&gt;
= The challenge of security testing RESTful web services =&lt;br /&gt;
* Inspecting the application does not reveal the attack surface, I.e. the URLs and parameter structure used by the RESTful web service. The reasons are:&lt;br /&gt;
** No application utilizes all the available functions and parameters exposed by the service &lt;br /&gt;
** Those used are often activated dynamically by client side code and not as links in pages.&lt;br /&gt;
** The client application is often not a web application and does not allow inspection of the activating link or even relevant code. &lt;br /&gt;
* The parameters are none standard making it hard to determine what is just part of the URL or a constant header and what is a parameter worth fuzzing.&lt;br /&gt;
* As a machine interface the number of parameters used can be very large, for example a JSON structure may include dozens of parameters. Fuzzing each one significantly lengthen the time required for testing.&lt;br /&gt;
* Custom authentication mechanisms require reverse engineering and make popular tools not useful as they cannot track a login session.&lt;br /&gt;
&lt;br /&gt;
= How to pen test a RESTful web service? =&lt;br /&gt;
; Determine the attack surface through documentation - RESTful pen testing might be better off if some level of white box testing is allowed and you can get information about the service. This information will ensure fuller coverage of the attach surface. Such information to look for:&lt;br /&gt;
* Formal service description - While for other types of web services such as SOAP a formal description, usually in WSDL is often available, this is seldom the case for REST. That said, either WSDL 2.0 or WADL can describe REST and are sometimes used.&lt;br /&gt;
* A developer guide for using the service may be less detailed but will commonly be found, and might even be considered &amp;quot;black box&amp;quot;&lt;br /&gt;
* Application source or configuration - in many frameworks, including dotNet ,the REST service definition  might be easily obtained from configuration files rather than from code.&lt;br /&gt;
		&lt;br /&gt;
; Collect full requests using a proxy - while always an important pen testing step, this is more important for REST based applications as the application UI may not give clues on the actual attack surface. Note that the proxy must be able to collect full requests and not just URLs as REST services utilize more than just GET parameters.&lt;br /&gt;
	&lt;br /&gt;
; Analyze collected requests to determine the attack surface:&lt;br /&gt;
* Look for non-standard parameters:&lt;br /&gt;
** Look for abnormal HTTP headers - those would many times be header based parameters. &lt;br /&gt;
** Determine if a URL segment has a repeating pattern across URLs. Such patterns can include a date, a number or an ID like string and indicate that the URL segment is a URL embedded parameter. For example: http://server/srv/2013-10-21/use.php&lt;br /&gt;
** Look for structured parameter values - those may be JSON, XML or a non-standard structure. &lt;br /&gt;
** If the last element of a URL does not have an extension, it may be a parameter. This is especially true if the application technology normally uses extensions or if a previous segment does have an extension. For example: http://server/svc/Grid.asmx/GetRelatedListItems&lt;br /&gt;
** Look for highly varying URL segments - a single URL segment that has many values may be parameter and not a physical directory. For example if the URL http://server/src/XXXX/page repeats with hundreds of value for XXXX, chances XXXX is a parameter.&lt;br /&gt;
; Verify non-standard parameters: in some cases (but not all), setting the value of a URL segment suspected of being a parameter to a value expected to be invalid can help determine if it is a path elements of a parameter. If a path element, the web server will return a 404 message, while for an invalid value to a parameter the answer would be an application level message as the value is legal at the web server level.&lt;br /&gt;
			&lt;br /&gt;
; Analyzing collected requests to optimize fuzzing - after identifying potential parameters to fuzz, analyze the collected values for each to determine -&lt;br /&gt;
* Valid vs. invalid values, so that fuzzing can focus on marginal invalid values. For example sending &amp;quot;0&amp;quot; for a value found to be always a positive integer.&lt;br /&gt;
* Sequences allowing to fuzz beyond the range presumably allocated to the current user.&lt;br /&gt;
&lt;br /&gt;
; Lastly, when fuzzing, don't forget to emulate the authentication mechanism used.&lt;br /&gt;
	&lt;br /&gt;
= Related Resources =&lt;br /&gt;
* [[REST Security Cheat Sheet]] - the other side of this cheat sheet&amp;lt;br&amp;gt;&lt;br /&gt;
* [http://www.xiom.com/2011/11/20/restful_webservices_testing RESTful services, web security blind spot] - a presentation (including video) elaborating on most of the topics on this cheat. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Ofer Shezaf - ofer@shezaf.com&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=REST_Assessment_Cheat_Sheet&amp;diff=162264</id>
		<title>REST Assessment Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=REST_Assessment_Cheat_Sheet&amp;diff=162264"/>
				<updated>2013-11-01T23:11:35Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Related Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About RESTful Web Services =&lt;br /&gt;
&lt;br /&gt;
Web Services are an implementation of web technology used for machine to machine communication. As such they are used for Inter application communication, Web 2.0 and Mashups and by desktop and mobile applications to call a server. RESTful web services (often called simply REST) are a light weight variant of Web Services based on the RESTful design pattern. In practice RESTful web services utilizes HTTP requests that are similar to regular HTTP calls in contrast with other Web Services technologies such as SOAP which utilizes a complex protocol.&lt;br /&gt;
&lt;br /&gt;
= Key relevant properties of RESTful web services =&lt;br /&gt;
* Use of HTTP methods (GET, POST, PUT and DELETE) as the primary verb for the requested operation.&lt;br /&gt;
* None standard parameters specifications:&lt;br /&gt;
** As part of the URL&lt;br /&gt;
** In headers&lt;br /&gt;
* Structured parameters and responses using JSON or XML in a parameter values, request body or response body. Those are required to communicate machine useful information.&lt;br /&gt;
* Custom authentication and session management, often utilizing custom security tokens: this is needed as machine to machine communication does not allow for login sequences.&lt;br /&gt;
* Lack of formal documentation. A proposed standard for describing RESTful web services called WADL was never officially adapted. &lt;br /&gt;
&lt;br /&gt;
= The challenge of security testing RESTful web services =&lt;br /&gt;
* Inspecting the application does not reveal the attack surface, I.e. the URLs and parameter structure used by the RESTful web service. The reasons are:&lt;br /&gt;
** No application utilizes all the available functions and parameters exposed by the service &lt;br /&gt;
** Those used are often activated dynamically by client side code and not as links in pages.&lt;br /&gt;
** The client application is often not a web application and does not allow inspection of the activating link or even relevant code. &lt;br /&gt;
* The parameters are none standard making it hard to determine what is just part of the URL or a constant header and what is a parameter worth fuzzing.&lt;br /&gt;
* As a machine interface the number of parameters used can be very large, for example a JSON structure may include dozens of parameters. Fuzzing each one significantly lengthen the time required for testing.&lt;br /&gt;
* Custom authentication mechanisms require reverse engineering and make popular tools not useful as they cannot track a login session.&lt;br /&gt;
&lt;br /&gt;
= How to pen test a RESTful web service? =&lt;br /&gt;
; Determine the attack surface through documentation - RESTful pen testing might be better off if some level of white box testing is allowed and you can get information about the service. This information will ensure fuller coverage of the attach surface. Such information to look for:&lt;br /&gt;
* Formal service description - While for other types of web services such as SOAP a formal description, usually in WSDL is often available, this is seldom the case for REST. That said, either WSDL 2.0 or WADL can describe REST and are sometimes used.&lt;br /&gt;
* A developer guide for using the service may be less detailed but will commonly be found, and might even be considered &amp;quot;black box&amp;quot;&lt;br /&gt;
* Application source or configuration - in many frameworks, including dotNet ,the REST service definition  might be easily obtained from configuration files rather than from code.&lt;br /&gt;
		&lt;br /&gt;
; Collect full requests using a proxy - while always an important pen testing step, this is more important for REST based applications as the application UI may not give clues on the actual attack surface. Note that the proxy must be able to collect full requests and not just URLs as REST services utilize more than just GET parameters.&lt;br /&gt;
	&lt;br /&gt;
; Analyze collected requests to determine the attack surface:&lt;br /&gt;
* Look for non-standard parameters:&lt;br /&gt;
** Look for abnormal HTTP headers - those would many times be header based parameters. &lt;br /&gt;
** Determine if a URL segment has a repeating pattern across URLs. Such patterns can include a date, a number or an ID like string and indicate that the URL segment is a URL embedded parameter. For example: http://server/srv/2013-10-21/use.php&lt;br /&gt;
** Look for structured parameter values - those may be JSON, XML or a non-standard structure. &lt;br /&gt;
** If the last element of a URL does not have an extension, it may be a parameter. This is especially true if the application technology normally uses extensions or if a previous segment does have an extension. For example: http://server/svc/Grid.asmx/GetRelatedListItems&lt;br /&gt;
** Look for highly varying URL segments - a single URL segment that has many values may be parameter and not a physical directory. For example if the URL http://server/src/XXXX/page repeats with hundreds of value for XXXX, chances XXXX is a parameter.&lt;br /&gt;
; Verify non-standard parameters: in some cases (but not all), setting the value of a URL segment suspected of being a parameter to a value expected to be invalid can help determine if it is a path elements of a parameter. If a path element, the web server will return a 404 message, while for an invalid value to a parameter the answer would be an application level message as the value is legal at the web server level.&lt;br /&gt;
			&lt;br /&gt;
; Analyzing collected requests to optimize fuzzing - after identifying potential parameters to fuzz, analyze the collected values for each to determine -&lt;br /&gt;
* Valid vs. invalid values, so that fuzzing can focus on marginal invalid values. For example sending &amp;quot;0&amp;quot; for a value found to be always a positive integer.&lt;br /&gt;
* Sequences allowing to fuzz beyond the range presumably allocated to the current user.&lt;br /&gt;
&lt;br /&gt;
; Lastly, when fuzzing, don't forget to emulate the authentication mechanism used.&lt;br /&gt;
	&lt;br /&gt;
= Related Resources =&lt;br /&gt;
[[REST Security Cheat Sheet]] - the other side of this cheat sheet&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.xiom.com/2011/11/20/restful_webservices_testing RESTful services, web security blind spot] - a presentation (including video) elaborating on most of the topics on this cheat. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Ofer Shezaf - ofer@shezaf.com&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=REST_Assessment_Cheat_Sheet&amp;diff=162263</id>
		<title>REST Assessment Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=REST_Assessment_Cheat_Sheet&amp;diff=162263"/>
				<updated>2013-11-01T23:10:48Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: Created page with &amp;quot;= About RESTful Web Services =  Web Services are an implementation of web technology used for machine to machine communication. As such they are used for Inter application com...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About RESTful Web Services =&lt;br /&gt;
&lt;br /&gt;
Web Services are an implementation of web technology used for machine to machine communication. As such they are used for Inter application communication, Web 2.0 and Mashups and by desktop and mobile applications to call a server. RESTful web services (often called simply REST) are a light weight variant of Web Services based on the RESTful design pattern. In practice RESTful web services utilizes HTTP requests that are similar to regular HTTP calls in contrast with other Web Services technologies such as SOAP which utilizes a complex protocol.&lt;br /&gt;
&lt;br /&gt;
= Key relevant properties of RESTful web services =&lt;br /&gt;
* Use of HTTP methods (GET, POST, PUT and DELETE) as the primary verb for the requested operation.&lt;br /&gt;
* None standard parameters specifications:&lt;br /&gt;
** As part of the URL&lt;br /&gt;
** In headers&lt;br /&gt;
* Structured parameters and responses using JSON or XML in a parameter values, request body or response body. Those are required to communicate machine useful information.&lt;br /&gt;
* Custom authentication and session management, often utilizing custom security tokens: this is needed as machine to machine communication does not allow for login sequences.&lt;br /&gt;
* Lack of formal documentation. A proposed standard for describing RESTful web services called WADL was never officially adapted. &lt;br /&gt;
&lt;br /&gt;
= The challenge of security testing RESTful web services =&lt;br /&gt;
* Inspecting the application does not reveal the attack surface, I.e. the URLs and parameter structure used by the RESTful web service. The reasons are:&lt;br /&gt;
** No application utilizes all the available functions and parameters exposed by the service &lt;br /&gt;
** Those used are often activated dynamically by client side code and not as links in pages.&lt;br /&gt;
** The client application is often not a web application and does not allow inspection of the activating link or even relevant code. &lt;br /&gt;
* The parameters are none standard making it hard to determine what is just part of the URL or a constant header and what is a parameter worth fuzzing.&lt;br /&gt;
* As a machine interface the number of parameters used can be very large, for example a JSON structure may include dozens of parameters. Fuzzing each one significantly lengthen the time required for testing.&lt;br /&gt;
* Custom authentication mechanisms require reverse engineering and make popular tools not useful as they cannot track a login session.&lt;br /&gt;
&lt;br /&gt;
= How to pen test a RESTful web service? =&lt;br /&gt;
; Determine the attack surface through documentation - RESTful pen testing might be better off if some level of white box testing is allowed and you can get information about the service. This information will ensure fuller coverage of the attach surface. Such information to look for:&lt;br /&gt;
* Formal service description - While for other types of web services such as SOAP a formal description, usually in WSDL is often available, this is seldom the case for REST. That said, either WSDL 2.0 or WADL can describe REST and are sometimes used.&lt;br /&gt;
* A developer guide for using the service may be less detailed but will commonly be found, and might even be considered &amp;quot;black box&amp;quot;&lt;br /&gt;
* Application source or configuration - in many frameworks, including dotNet ,the REST service definition  might be easily obtained from configuration files rather than from code.&lt;br /&gt;
		&lt;br /&gt;
; Collect full requests using a proxy - while always an important pen testing step, this is more important for REST based applications as the application UI may not give clues on the actual attack surface. Note that the proxy must be able to collect full requests and not just URLs as REST services utilize more than just GET parameters.&lt;br /&gt;
	&lt;br /&gt;
; Analyze collected requests to determine the attack surface:&lt;br /&gt;
* Look for non-standard parameters:&lt;br /&gt;
** Look for abnormal HTTP headers - those would many times be header based parameters. &lt;br /&gt;
** Determine if a URL segment has a repeating pattern across URLs. Such patterns can include a date, a number or an ID like string and indicate that the URL segment is a URL embedded parameter. For example: http://server/srv/2013-10-21/use.php&lt;br /&gt;
** Look for structured parameter values - those may be JSON, XML or a non-standard structure. &lt;br /&gt;
** If the last element of a URL does not have an extension, it may be a parameter. This is especially true if the application technology normally uses extensions or if a previous segment does have an extension. For example: http://server/svc/Grid.asmx/GetRelatedListItems&lt;br /&gt;
** Look for highly varying URL segments - a single URL segment that has many values may be parameter and not a physical directory. For example if the URL http://server/src/XXXX/page repeats with hundreds of value for XXXX, chances XXXX is a parameter.&lt;br /&gt;
; Verify non-standard parameters: in some cases (but not all), setting the value of a URL segment suspected of being a parameter to a value expected to be invalid can help determine if it is a path elements of a parameter. If a path element, the web server will return a 404 message, while for an invalid value to a parameter the answer would be an application level message as the value is legal at the web server level.&lt;br /&gt;
			&lt;br /&gt;
; Analyzing collected requests to optimize fuzzing - after identifying potential parameters to fuzz, analyze the collected values for each to determine -&lt;br /&gt;
* Valid vs. invalid values, so that fuzzing can focus on marginal invalid values. For example sending &amp;quot;0&amp;quot; for a value found to be always a positive integer.&lt;br /&gt;
* Sequences allowing to fuzz beyond the range presumably allocated to the current user.&lt;br /&gt;
&lt;br /&gt;
; Lastly, when fuzzing, don't forget to emulate the authentication mechanism used.&lt;br /&gt;
	&lt;br /&gt;
= Related Resources =&lt;br /&gt;
[[REST Security Cheat Sheet]] - the other side of this cheat sheet&lt;br /&gt;
[http://www.xiom.com/2011/11/20/restful_webservices_testing RESTful services, web security blind spot] - a presentation (including video) elaborating on most of the topics on this cheat. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Ofer Shezaf - ofer@shezaf.com&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=160655</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=160655"/>
				<updated>2013-10-14T05:58:47Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again?‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''  &amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]] | [http://www.youtube.com/watch?v=WTmd7ahBXAU&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=1 watch video])&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
([http://www.youtube.com/watch?v=PBqqKYgU2ZM&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=2 watch video])&lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_Adi_Sharabani_Mobile_Threats.pdf‎|download presentation]] | [http://www.youtube.com/watch?v=nJU98g1SdBM&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=12 watch video])&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''    &lt;br /&gt;
([http://www.youtube.com/watch?v=KIgMMLS8_Jc&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=3 watch video])&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]] | [http://www.youtube.com/watch?v=jUBC4qY0akg&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=4 watch video])‎ &lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]] | [http://www.youtube.com/watch?v=tAQTMdNU5dA&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=5 watch video])&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ‎===&lt;br /&gt;
'''''Erez Metula, Application Security Expert, AppSec Labs (Founder)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf|download presentation]] | [http://www.youtube.com/watch?v=mFW2ST4-b4s&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=6 watch video]) &lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Chilik_Tamir_GameOfPwns-Pwning_iOS_pentesting_with_iNalyzer.pdf‎|download presentation]] | [http://www.youtube.com/watch?v=gJK6G7y7AvY&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=7 watch video])&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Oren_Peleg_Automatic_trust_based_segregation_for_content_providers.pdf|download presentation]] | [http://www.youtube.com/watch?v=QNqcC_gS6Y0&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=8 watch video])&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ‎===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf|download presentation]] | [http://www.youtube.com/watch?v=D5dyf13RbCU&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=9 watch video])&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''    &lt;br /&gt;
([http://www.youtube.com/watch?v=rNecoaL78Sw&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=10 watch video])&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ‎===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''   &lt;br /&gt;
([[Media:OWASP_IL_2013_10_Irene_Abezgauz_Evolution_of_Application_Security.pdf‎|download presentation]] | [http://www.youtube.com/watch?v=ASZvPxGHZ5g&amp;amp;list=SPA4gj-PiNukdr7SY4XKoF4xhb0XZYw-WI&amp;amp;index=11 watch video])&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Oren_Peleg_Automatic_trust_based_segregation_for_content_providers.pdf&amp;diff=160654</id>
		<title>File:OWASP IL 2013 10 Oren Peleg Automatic trust based segregation for content providers.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Oren_Peleg_Automatic_trust_based_segregation_for_content_providers.pdf&amp;diff=160654"/>
				<updated>2013-10-14T05:57:35Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Chilik_Tamir_GameOfPwns-Pwning_iOS_pentesting_with_iNalyzer.pdf&amp;diff=160653</id>
		<title>File:OWASP IL 2013 10 Chilik Tamir GameOfPwns-Pwning iOS pentesting with iNalyzer.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Chilik_Tamir_GameOfPwns-Pwning_iOS_pentesting_with_iNalyzer.pdf&amp;diff=160653"/>
				<updated>2013-10-14T05:54:04Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013&amp;diff=159988</id>
		<title>OWASP Israel 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013&amp;diff=159988"/>
				<updated>2013-10-08T19:00:15Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Location and Time */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Location and Time  ==&lt;br /&gt;
&lt;br /&gt;
The 2013 annual OWASP AppSec Israel conference was held at the Interdisciplinary Center in Herzliya (IDC) on October 1st, in the Efi Arazi school of Computer Science.  With well over 450 participants, it was a huge and impressive success! You can find pictures of the event on [https://www.facebook.com/media/set/?set=a.10151737522773985.1073741834.225900483984&amp;amp;type=3 ComSec facebook page]&lt;br /&gt;
&lt;br /&gt;
Thanks for participation in the event. Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations.&lt;br /&gt;
&lt;br /&gt;
The conference is sponsored by: &lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_IL_2013_Sponsors}} &lt;br /&gt;
&lt;br /&gt;
For further details contact Avi Douglen (douglen at hotmail.com)&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_IL_2013_Agenda}} &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2013 is a success. If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me. &lt;br /&gt;
&lt;br /&gt;
=== Contributors  ===&lt;br /&gt;
&lt;br /&gt;
*Avi Douglen (Independent)&lt;br /&gt;
*Or Katz (Akamai)&lt;br /&gt;
*Ory Segal (Akamai)&lt;br /&gt;
*Ofer Maor (Quotium) &lt;br /&gt;
*Itzik Kotler (Independent)&lt;br /&gt;
*Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:OWASP_Israel_2013]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159880</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159880"/>
				<updated>2013-10-07T16:08:20Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Your mobile device in the service of the malicious hacker (Live Demo) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again?‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''  &amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_Adi_Sharabani_Mobile_Threats.pdf‎|download presentation]])&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎ &lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ‎===&lt;br /&gt;
'''''Erez Metula, Application Security Expert, AppSec Labs (Founder)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf|download presentation]]) &lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ‎===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ([[Media:OWASP_IL_2013_10_Irene_Abezgauz_Evolution_of_Application_Security.pdf‎|download presentation]])‎===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159879</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159879"/>
				<updated>2013-10-07T16:06:03Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Your mobile device in the service of the malicious hacker (Live Demo) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again?‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''  &amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_Adi_Sharabani_Mobile_Threats.pdf‎]])&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎ &lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ‎===&lt;br /&gt;
'''''Erez Metula, Application Security Expert, AppSec Labs (Founder)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf|download presentation]]) &lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ‎===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ([[Media:OWASP_IL_2013_10_Irene_Abezgauz_Evolution_of_Application_Security.pdf‎|download presentation]])‎===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Adi_Sharabani_Mobile_Threats.pdf&amp;diff=159878</id>
		<title>File:OWASP IL 2013 10 Adi Sharabani Mobile Threats.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Adi_Sharabani_Mobile_Threats.pdf&amp;diff=159878"/>
				<updated>2013-10-07T16:04:08Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013&amp;diff=159652</id>
		<title>OWASP Israel 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013&amp;diff=159652"/>
				<updated>2013-10-03T12:37:35Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Location and Time */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Location and Time  ==&lt;br /&gt;
&lt;br /&gt;
The 2013 annual OWASP AppSec Israel conference was held at the Interdisciplinary Center in Herzliya (IDC) on October 1st, in the Efi Arazi school of Computer Science.  With around 450 participants it was a huge and impressive success!&lt;br /&gt;
&lt;br /&gt;
Thanks for participation in the event. Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
&lt;br /&gt;
The conference is sponsored by: &lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_IL_2013_Sponsors}} &lt;br /&gt;
&lt;br /&gt;
For further details contact Avi Douglen (douglen at hotmail.com)&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_IL_2013_Agenda}} &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2013 is a success. If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me. &lt;br /&gt;
&lt;br /&gt;
=== Contributors  ===&lt;br /&gt;
&lt;br /&gt;
*Avi Douglen (Independent)&lt;br /&gt;
*Or Katz (Akamai)&lt;br /&gt;
*Ory Segal (Akamai)&lt;br /&gt;
*Ofer Maor (Quotium) &lt;br /&gt;
*Itzik Kotler (Independent)&lt;br /&gt;
*Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:OWASP_Israel_2013]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013&amp;diff=159651</id>
		<title>OWASP Israel 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013&amp;diff=159651"/>
				<updated>2013-10-03T12:36:35Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Registration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Location and Time  ==&lt;br /&gt;
&lt;br /&gt;
The 2013 annual OWASP AppSec Israel conference will be held at the Interdisciplinary Center in Herzliya (IDC) on October 1st, in the Efi Arazi school of Computer Science. &lt;br /&gt;
&lt;br /&gt;
The conference is sponsored by: &lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_IL_2013_Sponsors}} &lt;br /&gt;
&lt;br /&gt;
For further details contact Avi Douglen (douglen at hotmail.com)   &lt;br /&gt;
&lt;br /&gt;
Thanks for participation in the event. With around 450 participants it was a huge and impressive success!&lt;br /&gt;
&lt;br /&gt;
Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_IL_2013_Agenda}} &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2013 is a success. If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me. &lt;br /&gt;
&lt;br /&gt;
=== Contributors  ===&lt;br /&gt;
&lt;br /&gt;
*Avi Douglen (Independent)&lt;br /&gt;
*Or Katz (Akamai)&lt;br /&gt;
*Ory Segal (Akamai)&lt;br /&gt;
*Ofer Maor (Quotium) &lt;br /&gt;
*Itzik Kotler (Independent)&lt;br /&gt;
*Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:OWASP_Israel_2013]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159650</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159650"/>
				<updated>2013-10-03T12:34:50Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* From Obscurity to Pop Culture - Evolution of Application Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again?‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''  &amp;lt;br&amp;gt;&lt;br /&gt;
([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎ &lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ‎===&lt;br /&gt;
'''''Erez Metula, Application Security Expert, AppSec Labs (Founder)''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf|download presentation]]) &lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ‎===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting''''' &amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ([[Media:OWASP_IL_2013_10_Irene_Abezgauz_Evolution_of_Application_Security.pdf‎|download presentation]])‎===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=159649</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=159649"/>
				<updated>2013-10-03T12:34:03Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Previous OWASP Israel Conferences and Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:douglen@hotmail.com Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board:'''[mailto:ofer@shezaf.com Ofer Shezaf]''' (Chapter Founder), '''Avi Douglen''', '''Or Katz''',''' Adi Sharabani''',''' Ofer Maor''', '''Ory Segal''', '''Itzik Kotler'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Ofer Shezaf, Ofer Maor&lt;br /&gt;
* Mailing List Management: Ofer Shezaf, Avi Douglen, Ofer Maor   &lt;br /&gt;
 &lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September&lt;br /&gt;
* Periodical meetings. If you would like to host a meeting or speak in one contact [mailto:ofer.maor@owasp.org Ofer Maor] or [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up!&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==&lt;br /&gt;
The OWASP Top 10 was translated to Hebrew and is [[OWASP_Top10_Hebrew|available for download]]. &lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
; '''[[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with approximately 450 participants!''' (Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations)&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Irene_Abezgauz_Evolution_of_Application_Security.pdf&amp;diff=159648</id>
		<title>File:OWASP IL 2013 10 Irene Abezgauz Evolution of Application Security.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Irene_Abezgauz_Evolution_of_Application_Security.pdf&amp;diff=159648"/>
				<updated>2013-10-03T12:31:48Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159636</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159636"/>
				<updated>2013-10-02T20:29:18Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Delivering Security in Continuous Delivery Environment */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? ([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]])‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ([[Media:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf|download presentation]])‎===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ([[Media:OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf|download presentation]])‎===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159635</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159635"/>
				<updated>2013-10-02T20:28:20Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* The ReFrameworker Android runtime manipulator – pentesting Android apps like a king */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? ([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]])‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ([[Media:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf|download presentation]])‎===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159634</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159634"/>
				<updated>2013-10-02T20:27:37Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? ([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ([[Media:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf|download presentation]])‎ ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159633</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159633"/>
				<updated>2013-10-02T20:26:54Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Utilizing Popular Websites for Malicious Purposes Using RDI */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? ([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ([[Media:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf|download presentation]])‎===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159632</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159632"/>
				<updated>2013-10-02T20:26:09Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Why Are Investors Excited About Cyber Security Startups, Again? (download presentation)‎ */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? ([[media:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159631</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159631"/>
				<updated>2013-10-02T20:25:51Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Why Are Investors Excited About Cyber Security Startups, Again? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? ([[OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf‎|download presentation]])‎ === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159630</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159630"/>
				<updated>2013-10-02T20:24:46Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Spam, Death Threats, and Other Abuses of Online Communities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ([[Media:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf‎|download presentation]])‎ ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159629</id>
		<title>OWASP Israel 2013 Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_Presentations&amp;diff=159629"/>
				<updated>2013-10-02T20:23:51Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* STDD - The protection you REALLY need */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Keynote =&lt;br /&gt;
&lt;br /&gt;
=== Why Are Investors Excited About Cyber Security Startups, Again? === &lt;br /&gt;
'''''Ron Moritz, Consigliere on Venture Strategies, Issues and Trends'''''&lt;br /&gt;
&lt;br /&gt;
Ron will speak about the current state of security startups, the current crop of security problems being solved by startups, and the trends of what solutions investment capital is looking to support. &lt;br /&gt;
&lt;br /&gt;
The Keynote will be in English. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
Ron Moritz is a well-regarded executive with over twenty-five years of broad operational and strategy experience from premier technology companies such as Microsoft (GM, Forefront), Symantec (SVP &amp;amp; CTO), and Computer Associates (SVP, Security Products Business Unit), where he was a member of each company's distinguished corporate or divisional leadership teams. &lt;br /&gt;
 &lt;br /&gt;
Having advised C-level executives, boards of directors, venture capitalists and private equity firms on value-creation activities including new markets, acquisition and divestiture strategy, global sourcing of labor, major technology decisions, and eco-system development, Mr. Moritz brings a unique point of view at the intersection of technology, strategy, global markets and finance.&lt;br /&gt;
&lt;br /&gt;
Ron is currently a partner in Aura Coffee, a third-wave coffee roasting company based in Modiin; a member of the Fireblade board of directors; and a mentor Jerusalem-based crowd-funding leader, OurCrowd.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Plenary Sessions = &lt;br /&gt;
&lt;br /&gt;
=== Evolution of online banking attack techniques ===&lt;br /&gt;
'''''Amit Klein, CTO, Trusteer'''''   &lt;br /&gt;
&lt;br /&gt;
I will survey the evolution of attack techniques against online banking since the mid-2000s till today. This starts with keylogging malware, moves over to screenshooting malware, and finally gets to HTML injection malware (the “Man in the Browser” concept). I will then show several examples of the power of MitB attacks, especially when combined with social engineering, and how this can overcome many security measures such as two-factor authentication and transaction verification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt;    &lt;br /&gt;
&lt;br /&gt;
As Trusteer’s CTO, Amit Klein manages the company’s security research. Prior to Trusteer, Mr. Klein was Chief Scientist at Cyota Inc. (acquired by RSA Security), a leading provider of layered authentication solutions. In this role, Mr. Klein researched technologies that prevent online fraud, phishing, and pharming and filed several patents in those areas. Prior to this, Mr. Klein worked as Director of Security and Research at Sanctum, Inc. (acquired by Watchfire), where he was responsible for the security architecture of all Sanctum products. Mr. Klein holds a B.Sc. (cum laude) in Mathematics and Physics.&lt;br /&gt;
Mr. Klein is a world-renowned security researcher, having published more than thirty articles, papers and technical notes on the topic of Internet security. He was named CTO of the Year by InfoWorld Magazine and has presented at many prestigious conferences including RSA, FSISAC, OWASP and CertConf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Your mobile device in the service of the malicious hacker (Live Demo) ===&lt;br /&gt;
''''' Adi Sharabani, CEO, Skycure '''''&lt;br /&gt;
&lt;br /&gt;
We all developed natural instincts when it comes to protecting our physical space. We all know to look to the sides before crossing the road, and we all have some capabilities to assess current risks and make decisions accordingly. However, when it comes to using our mobile devices in the cyber era, these instincts have not yet evolved. People and organizations are at risk, and do not have an understanding how to assess or mitigate them. On top of that, current protection solutions provide inadequate protection against these threats. The organizational need to support mobile devices for business related activity created a huge gap in securing the organization. Adi Sharabani's keynote will highlight some of these threats via a live demonstration of a mobile hacking activity. The audience will be able to opt in for the demo, reflecting how easy it is for a hacker to hack into remote devices.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mr. Adi Sharabani is a world-class security expert and the CEO of Skycure, a start-up that focuses on providing firewall solutions for mobile devices. Formerly, Adi led the security of IBM software products. He came to IBM through the Watchfire acquisition, a start-up company which was a pioneer in the field of application security. Among his roles, Adi built and led the Watchfire’s security group. Adi has written many patents in the security space, and his works have been presented in many known conferences such as BlackHat, RSA, OWASP, Innovate, Herzliya Conference and many more; his presentations and keynotes are constantly being ranked as best presentations of most conferences he presents at. Adi is also a fellow at Prof. Yuval Ne’eman’s workshop. In his spare time, Adi teaches at Ohel-Shem high school, and is a part of the vision and implementation of the cyber-defense curriculum for high school students, a vision that is now being implemented in Israel.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track A = &lt;br /&gt;
&lt;br /&gt;
=== Get Ready for the Next Big Wave of Attacks: Hacking of Leading CMS Systems ===&lt;br /&gt;
'''''Maty Siman, CTO, Checkmarx'''''&lt;br /&gt;
&lt;br /&gt;
The flow of this talk is given by – you! Before this talk, we emailed the audience to provide us with their favorite WordPress plugins that they would like to test for security. In a live demo, we assess the security of the requested plugins. Previous similar trials that we performed on WordPress showed that 30% of the top 50 most downloaded plugins were vulnerable to common Web attacks. What will be the results of this experiment?&lt;br /&gt;
 &lt;br /&gt;
As we’ll continue to show, assessing the security posture of a plugin is only the hacker’s first step in mass attacks. As opposed to past mass SQL Injection attacks which leveraged tools such as SQLMap, these next wave of attacks do not focus on the site’s platform or customized development code. Rather, these attacks leverage on the increasing popularity of CMS platforms such as WordPress and Joomla. The maturity, prevalence and market penetration of CMS platforms allow any marketing, sales or HR individual to easily set up their own fully-operational site. Accordingly, CMS apps are flourishing – and so are the vulnerabilities in these apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Maty is the CTO and founder of Checkmarx. Maty has more than a decade of experience in software development, IT security and source-code analysis. An authoritative figure in application security, Maty is regularly interviewed by the media on security-breaking news and frequently speaks at various IT security conferences.  Prior to founding Checkmarx, Maty worked for two years at the Israeli Prime Minister’s Office as a senior IT security expert and project manager. Prior to that, he spent six years with the Israeli Defense Forces (IDF), where he established and led a development team in the IDF’s Information Security Center.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Utilizing Popular Websites for Malicious Purposes Using RDI ===&lt;br /&gt;
'''''Daniel Chechik, Security Researcher, Trustwave SpiderLabs''''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''''Anat Davidi, Security Researcher, Trustwave SpiderLabs'''''&lt;br /&gt;
&lt;br /&gt;
Reflected DOM Injection is a new attack vector first presented at the DefCon 21 conference in July. We will explain the technique and show a live demo where we use it to hide malicious code within popular and trusted websites.  For those of you who are interested in RDI but couldn’t make it to DefCon, we are bringing the talk to you!&lt;br /&gt;
&lt;br /&gt;
The introduction of this session will briefly review the struggle between malicious websites and security products. We will explain the issues of hosting a malicious website and the techniques security vendors use in order to block them. &lt;br /&gt;
We will then present our new technique to avoid detection and proceed to explain all parts of it in-depth. A full demo of the attack from beginning to end will be included.&lt;br /&gt;
common and known services published by popular websites will be used in order to dynamically construct an attack hosted for us by these services.&lt;br /&gt;
Finally, we will add a layer of defense to our attack, and generate malicious code which will become practically invisible to dynamic analysis engines and thus evade most of today's security engines and technologies.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Daniel Chechik is a veteran security researcher at Trustwave's SpiderLabs. Among other things, he specializes in malware analysis, web exploits detection, Trojan and botnet detection and neutralizing and defining security requirements for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Daniel served in a technological unit as a security specialist in the IDF. During the service, Daniel specialized in CheckPoint Firewall equipment, AntiVirus products and other IT security products.&lt;br /&gt;
Daniel, among other things, has spoken at the RSA conference, DefCon, holds CEH and CCSE certificates and has a patent pending for 'Detecting Malware Communication on an Infected Computing Device'.&lt;br /&gt;
 &lt;br /&gt;
Anat Davidi is a security researcher at Trustwave's SpiderLabs. Her role includes vulnerability analysis, malware analysis and developing detection logic for the Secure Web Gateway product.&lt;br /&gt;
Prior to that, Anat worked as a security consultant providing security reviews and penetration tests for organizations in various business sectors, ranging from banks and insurance companies to hi-tech corporations. Amongst other things, Anat has spoken at the RSA conference, DefCon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Invisibility Purge - Manipulating Properties Of Invisible &amp;amp; Dormant Asp.Net Controls ===&lt;br /&gt;
'''''Shay Chen, CTO, Ernst &amp;amp; Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Server-Side Web Controls became popular components in modern web application frameworks.&lt;br /&gt;
In addition to the development benefits of these components provide, they are also protected using a variety of security mechanisms, including digital signatures, content access restrictions and even invisibility. &lt;br /&gt;
However, developers that use these components improperly can expose the application to a variety of different attacks that can be executed despite, and sometimes due to the existence of security mechanisms. &lt;br /&gt;
The presentation will demonstrate several new methods that attackers can harness to bypass security mechanism, manipulate server control properties and identify, enumerate and activate events of dormant server web controls, in popular platforms such as ASP.Net, JSF and Mono.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Shay Chen is the CTO of Hacktics, an advanced security center of Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
As a victim of the law of familiarity, a decade of exposure to common vulnerabilities was enough to shift his focus to abnormal hacking methodologies and new attack vectors.&lt;br /&gt;
 &lt;br /&gt;
He is also a prominent blogger and researcher, and is responsible for many security publications, including new application-level attacks, testing methodologies and open source projects.  &lt;br /&gt;
As the co-author of the platforms &amp;quot;Diviner&amp;quot;, &amp;quot;SCIP&amp;quot; and &amp;quot;WAVSEP&amp;quot; he was involved in the publication of several large-scale researches in the field of automated security scanners.&lt;br /&gt;
 &lt;br /&gt;
Shay is an experienced speaker, has been instructing a variety of information security courses for the past 8 years, and had multiple appearances in international conferences, including Blackhat, Hacktivity, AppSecUSA and others. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== The ReFrameworker Android runtime manipulator – pentesting Android apps like a king ===&lt;br /&gt;
'''''Erez Metula, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
ReFrameworker is a new exiting addition to the AppUse pentest VM which we just released at recent BlackHat USA, targeting Android applications. With ReFrameworker, we can manipulate Android applications to make our life as pentesters a lot more easier. Does the app you test insists to be used only for a particular IMEI or phone number? Or does it break on invalidated certificates when you try to SSL MitM it using a proxy?   No problem! With ReFrameworker, you can just give a new behavior to any runtime method you'd like, like disabling verifications, controlling return values, and so on. Snooping on local SQL queries or encryption keys? ReFrameworker gives you a proxy for local variables so you can changes important or sensitive values on the fly.&lt;br /&gt;
The idea is that we'd built a new Android ROM for the sole purpose of pentesting Android apps, loaded with hooks at important places inside the Dalvik runtime. During this talk we'll witness the power of ReFrameworker, we'll learn how to use it, how it was implemented and how it can be extended.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Erez Metula Author of the book &amp;quot;Managed Code Rootkits&amp;quot;, is a world renowned application security expert. Erez has extensive hands-on experience performing security assessments, code reviews and secure development trainings for worldwide organizations, and had previously talked at international security conferences such as BlackHat, Defcon, OWASP, RSA, SOURCE, CanSecWest and more. He is the founder of AppSec Labs, where he focuses on advanced application security topics. Erez holds an MSc in computer science and he is CISSP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== A Game of Pwns: Pwning iPhone application security assessment using the iNalyzer framework ===&lt;br /&gt;
'''''Chilik Tamir, Chief Scientist, AppSec Labs'''''&lt;br /&gt;
&lt;br /&gt;
iNalyzer is an open-source free to use  pen-testing framework I  have recently updated for BlackHat USA, targeting iPhone applications. In the following presentation I will present my latest research on a new approach to performing security assessments of iOS applications utilizing the iNalyzer. The presentation will include live demonstration of using iNalyzer to transform a tedious black-box penetration testing into an exciting gray-box effort. &lt;br /&gt;
The talk will cover some of the problems with testing iOS applications, and present a wider picture of the testing process for different applications using iNalyzer, from the point of view of the tester, and how to handle the difficulties that may ensue.   &lt;br /&gt;
* You will learn how to utilize iNalyzer to bind the power of regular web vulnerability scanner - such as Zap, Burp or AppScan into the exciting world of iOS penetration testing.&lt;br /&gt;
* You will learn how to fill in the gaps and use iNalyzer in your IDA reversing effort when testing.&lt;br /&gt;
* You will learn how to manipulate iPhone applications to make our life as pen-testers a lot easier using iNalyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Chilik Tamir is an information security expert with over two decades of experience in training, research, development, testing and consulting in the field of applicative information security for clients in the fields of finance, security, government offices and corporations. His latest research - the iOS iNalyzer is an open-source iOS application Penetration Testing Dashboard. Among his previous publications you will find AppUse – a testing environment for Android applications developed together with Erez Metula; Belch – an automatic tool for analysis and testing of binary protocols such as Flex and Java-Serialization; Chilik is an experienced security trainer and speaker with previous talks and training in  security conferences such as BlackHat USA, HITB Amsterdam, OWASP Israel as well as training in cooperations such as Intel, HP, Cisco, Amdocs, Verint, RedBend and others. He is the Chief Scientist at AppSec Labs, where he acts as head of R&amp;amp;D and innovation. Chilik holds an Biomedical Engineering B.Sc. degree. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic trust based segregation for content providers on mobile devices ===&lt;br /&gt;
'''''Oren Poleg, IDC'''''&lt;br /&gt;
&lt;br /&gt;
In this work we have designed and developed a modification to the Android Content Providers that allows us to impose access restrictions on the sensitive data items they contain (such as contacts, calendar events) .&lt;br /&gt;
 &lt;br /&gt;
We have developed lightweight solution that is compatible with the current Android design (so it can be easily integrated with the current Android implementation)  that creates separation between different types of sensitive data, also separating them from the non-sensitive information in Android content providers. We allow the device owner to view the data in a unified manner, while 3rd party applications will be allowed access only to content created by them or that they were granted permission to view.&lt;br /&gt;
 &lt;br /&gt;
User interaction is not required for the security decisions. Instead, we are defining trust relationship between the data and the applications, in which the owner of the data can delegate access permissions  to the applications.&lt;br /&gt;
 &lt;br /&gt;
This approach will enable organization to store sensitive information on the device content providers, allow the user to easily access it from the organizational applications as well as from system applications while preventing its leakage through other 3rd party applications&lt;br /&gt;
While developed for Android, the concept can be implemented on other mobile devices, such as iPhone and Windows Phone.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Oren Poleg is a mobile platforms expert, with more than 10 years in the mobile platforms space.&lt;br /&gt;
As a team leader in (the Former) Sun Microsystems, Oren was responsible to the integration of Java VM into mobile devices, later to be followed with and research of smart phone infrastructures&lt;br /&gt;
Currently Oren is a working as a Consultant, dealing with Android Devices, Smart TVs and Network Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate/Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Track B = &lt;br /&gt;
&lt;br /&gt;
=== Web Application Forensics ===&lt;br /&gt;
'''''Renana Friedlich, Forensic Department Leader, Ernst and Young (Hacktics)'''''&lt;br /&gt;
&lt;br /&gt;
Most organizations are not aware of successful application-level attacks, until it's too late.&lt;br /&gt;
Application penetration tests don't provide information on attacks that ALREADY occurred, on attacks are CURRENTLY in progress, on failed attempts, or even on the actual impact.&lt;br /&gt;
Organizations usually rely on security products such as WAF and IDS to locate hacking incidents, but what about attacks that slipped pass the WAF?&lt;br /&gt;
What about attacks with a pattern that the IDS did not recognize? What about organizations that implemented these products too late, or not at all?&lt;br /&gt;
That's where Web Application Proactive Forensics comes in - A collection of detailed methodologies for locating evidence of attacks that were performed and/or exploited, including attacks listed in OWASP testing guide, WASC and CWE.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Renana Friedlich is the Forensic Department Leader at Hacktics, an advanced security center of EY. Renana specializes in forensic investigations, developing incident response, malware assessments, and escorting start-up companies in implementing forensic methodologies into their products.&lt;br /&gt;
Prior to working at Hacktics, she served at the intelligence corps for seven years, and has over nine years of experience in the information security field.&lt;br /&gt;
In recent years, Renana was a frequent speaker in the government sector and had multiple appearances in public conferences, including OWASP, annual risk management conferences, and universities. She also regularly instructs forensic and incident response courses in universities and clients from various industries.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== STDD - The protection you REALLY need ([[Media:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf|download presentation]])‎ ===&lt;br /&gt;
''''' Nir Valtman, R&amp;amp;D CSO, Retalix ''''' &amp;lt;br&amp;gt;&lt;br /&gt;
''''' Alex Linder, Solution Architect, Retalix '''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today in the agile world, many streams based on Acceptance Test Driven Development (ATDD). In this presentation we are going to demonstrate how to reuse this concept in context of security. In addition, this presentation includes common scenarios from attacker's point of view as well as the defender should think. Needless to mention, we have many demos...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Nir is employed in Retalix as R&amp;amp;D CSO. Before this position he worked as chief security architect, senior technology consultant, application security consultant, system security consultant and a technological trainer. As part of his positions, Nir didn't only consulting, but also performed hands-on activities in various fields, e.g. hardening, penetration testing and development for personal\internal applications. &amp;lt;br&amp;gt;&lt;br /&gt;
Nir has a BSc in computer science but his knowledge is based mainly on cowboy learning and information sharing with the techno-oriented communities. &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://www.valtman.org &lt;br /&gt;
&lt;br /&gt;
Alex is a technology geek, likes to research and play with new stuff. Alex is a highly experienced Solution Architect specializing in Software, middleware and APIs. &amp;lt;br&amp;gt;&lt;br /&gt;
Alex has more than 14 years of experience and performed vast roles in the Israeli market such as VP Professional services, Group manager, Solution Architect, Dev team leader and Senior consultant.&amp;lt;br&amp;gt;&lt;br /&gt;
Currently working as a solution architect of large scale R&amp;amp;D firm with cutting edge technologies.   &amp;lt;br&amp;gt;&lt;br /&gt;
Blog: http://linderalex.blogspot.co.il/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate / Advanced&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Spam, Death Threats, and Other Abuses of Online Communities ===&lt;br /&gt;
'''''Avi Douglen, Security Architect, Independant'''''&lt;br /&gt;
&lt;br /&gt;
Many contemporary websites are based on so-called “User Generated Content” (aka UGC). Furthermore, many sites oriented around a community of users enable users to interact with each other, via the site. Sites like Wikipedia and StackOverflow allow users to freely edit pages visible to all users,  popular discussion forums are based on continuous postings of content by users, and social networks such as Facebook encourage users to constantly add their own rich data to the site for others’ consumption. &lt;br /&gt;
&lt;br /&gt;
Aside from the usual web attacks common to all user input on websites, such as XSS and SQL Injection, there are some forms of attacks or abuse that are specific to sites such as these.  Some of them are purely technical, some of them are social in nature and just take advantage of the available technology. These are often exacerbated by the scope and huge amount of traffic to these sites, and take advantage of the network effect. &lt;br /&gt;
&lt;br /&gt;
The talk will be based in a large part on the speaker’s experience on the Stack Exchange network of sites, but will also compare to the models prevalent on other popular sites. We will discuss some of the aspects particular to these platforms, and show how even the more “boring” of these attacks can sometimes be interesting depending on the situation. We will also see some of the stranger happenings that occur on a large site. Finally, we will discuss and compare some of the different models that these huge websites use to limit the damage.  &lt;br /&gt;
We will of course focus on what is both these sites’ biggest weakness, and greatest strength - the community. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Avi Douglen had a CISSP before it was popular, but he is not a hipster. Avi is a high-end, independent security architect and developer, and has been designing, developing and testing secure applications, and leading development teams in building secure products, for over 15 years. Avi is also a Community Moderator (volunteer basis) on Stack Exchange’s fantastic Information Security site (http://security.stackexchange.com), sister site to Stack Overflow. As a moderator, and as an active user on several other Stack Exchange sites, he has spent a lot of time handling these types of attacks, and has had the opportunity to see up close, what works, what doesn’t, and what can scale to millions of users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introductory&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Delivering Security in Continuous Delivery Environment ===&lt;br /&gt;
''''' Yaniv Simsolo, Senior Consultant, Comsec Consulting'''''&lt;br /&gt;
&lt;br /&gt;
Moving from traditional development environment to Agile environment, creates many a challenge to the security of the organization and developed system. Moving from Agile development environment towards Continuous Delivery environment ups the stakes.&lt;br /&gt;
We will venture in to the challenges of delivering security in Continuous Delivery environment, and test whether in-depth security is achievable.&lt;br /&gt;
Relying on industry evidences, a unique approach to the evolvement of security under Continuous Delivery development environment will be presented.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Yaniv Simsolo, CISSP, Senior IT Security Professional. A consultant in application security from 2004, and an expert of security of compound and enterprise scale systems. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Designing a national defense strategy for DDoS applications and volume attacks ===&lt;br /&gt;
'''''Mirit Kagarlitsky, Head of System Analysis, Israeli National Cyber Bureau '''''&lt;br /&gt;
&lt;br /&gt;
DDoS attacks exploit vulnerabilities in different protocol stack layers, from the application layer and downward. These attacks undermine the availability of various services, some of which transcend the local interest of the compromised organization, bearing broader consequences.&lt;br /&gt;
Designing a national defense strategy for DDoS attacks has advantages, since the state has both the interest and the capacity to devise large-scale technological solutions of security from targeted attacks on critical services as well as from cumulative damage in this realm. The problem is that there is a wide spectrum of solutions and possible network locations for state intervention: services entry point, ISPs, cloud-based approaches and more; every solution should be analyzed from a national standpoint.&lt;br /&gt;
Our work examines when and where should the state take action in the realm, ranging from the individual organization to the ISP level. We also suggest how its accumulated benefit should be assessed in order to evaluate the overall effectiveness of the national strategy.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Mirit Kagarlitsky holds a B.Sc. in physics and mathematics from the Hebrew University in Jerusalem and is in the process of completion of M.Sc. in Statistics from Tel Aviv University. She has vast experience with operations research and system analysis in various fields, as an analyst and as a team leader. Today she work as the head of system analysis in the Israeli National Cyber Bureau.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Enhancing Web Application Defense Using Big Data ===&lt;br /&gt;
''''' Or Katz, Principal Security Researcher, Akamai Technologies '''''&lt;br /&gt;
&lt;br /&gt;
In recent years Big Data has become a commonly used technology in many products, in this presentation I will unveil practical examples on how we can improve web application defenses by using Big Data. Using Big Data enables us to combine web application filter triggers from multiple data sources. Big data analysis contributes to the improvement and enhances defense tactics. In this presentation I will show some examples such as:&lt;br /&gt;
* SQLi – detecting malicious users and their level of maliciousness&lt;br /&gt;
* Web Scraping – expose scrapers that fly under the radar and what is their target information&lt;br /&gt;
* False positives reduction – using Big Data in order to learn how to tune your configuration&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Or Katz has vast expertise in Web Application Firewall technology, working in market leading web application firewall vendors as a web application security researcher.&lt;br /&gt;
Mr. Katz is a board member in OWASP Israel chapter, frequent speaker in the chapter conferences and he was also responsible for leading the OWASP Top 10 Hebrew translation project.&lt;br /&gt;
Mr. Katz also published several innovative white papers on web applications defensive techniques.   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Intermediate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== From Obscurity to Pop Culture - Evolution of Application Security ===&lt;br /&gt;
''''' Irene Abezgauz, VP Product Management, Quotium'''''&lt;br /&gt;
&lt;br /&gt;
In 1998 the New York Times website was hacked. According to various news sources, the site underwent a thorough security test just two years before and at that point it became clear that 'it might not be sufficient'. Fifteen years later, application security trends talk about APTs, Agile SDLCs and Security Products being commoditized.&lt;br /&gt;
In this lecture we review the evolution of application security in the past decade and a half. Examining technology and aspects of security management from the early days of OWASP foundation to present day mobile application security testing as part of the development lifecycle.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Speaker Bio&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Irene has ten years of experience in information and application security. Focused on application security penetration testing and research she is a builder and breaker of things. She is the Product Manager of Seeker™, the new generation of automatic application security testing, and head of security research activities at Seeker Security (Quotium). Ms. Abezgauz has discovered numerous vulnerabilities and published advisories related to products of leading vendors.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Technical Level:&amp;lt;/u&amp;gt; Introduction&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Shay_Chen_Invisible_Purge.pdf&amp;diff=159628</id>
		<title>File:OWASP IL 2013 10 Shay Chen Invisible Purge.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Shay_Chen_Invisible_Purge.pdf&amp;diff=159628"/>
				<updated>2013-10-02T20:21:12Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Yaniv_Simsolo_Delivering_Security_in_CD_Environments.pdf&amp;diff=159627</id>
		<title>File:OWASP IL 2013 10 Yaniv Simsolo Delivering Security in CD Environments.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Yaniv_Simsolo_Delivering_Security_in_CD_Environments.pdf&amp;diff=159627"/>
				<updated>2013-10-02T20:21:07Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf&amp;diff=159626</id>
		<title>File:OWASP IL 2013 10 OWASP Ron Moritz Why Are Investors Excited About Cyber Security Startups.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_OWASP_Ron_Moritz_Why_Are_Investors_Excited_About_Cyber_Security_Startups.pdf&amp;diff=159626"/>
				<updated>2013-10-02T20:20:23Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf&amp;diff=159625</id>
		<title>File:OWASP IL 2013 10 Avi Douglan Spam-DeathThreats-Abuse-OnlineCommunities.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Avi_Douglan_Spam-DeathThreats-Abuse-OnlineCommunities.pdf&amp;diff=159625"/>
				<updated>2013-10-02T20:20:12Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf&amp;diff=159624</id>
		<title>File:OWASP IL 2013 10 Nir Valtman STDD.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Nir_Valtman_STDD.pdf&amp;diff=159624"/>
				<updated>2013-10-02T20:19:50Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Erez_Metula_The_ReFrameworker_Android_runtime_manipulator.pdf&amp;diff=159623</id>
		<title>File:OWASP IL 2013 10 Erez Metula The ReFrameworker Android runtime manipulator.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Erez_Metula_The_ReFrameworker_Android_runtime_manipulator.pdf&amp;diff=159623"/>
				<updated>2013-10-02T20:19:34Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Chechik_Davidi_Utilizing_Popular_Websites_for_Malicious_Purposes_Using_RDI.pdf&amp;diff=159622</id>
		<title>File:OWASP IL 2013 10 Chechik Davidi Utilizing Popular Websites for Malicious Purposes Using RDI.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_10_Chechik_Davidi_Utilizing_Popular_Websites_for_Malicious_Purposes_Using_RDI.pdf&amp;diff=159622"/>
				<updated>2013-10-02T20:18:44Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=159621</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=159621"/>
				<updated>2013-10-02T20:06:43Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:douglen@hotmail.com Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board:'''[mailto:ofer@shezaf.com Ofer Shezaf]''' (Chapter Founder), '''Avi Douglen''', '''Or Katz''',''' Adi Sharabani''',''' Ofer Maor''', '''Ory Segal''', '''Itzik Kotler'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Ofer Shezaf, Ofer Maor&lt;br /&gt;
* Mailing List Management: Ofer Shezaf, Avi Douglen, Ofer Maor   &lt;br /&gt;
 &lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September&lt;br /&gt;
* Periodical meetings. If you would like to host a meeting or speak in one contact [mailto:ofer.maor@owasp.org Ofer Maor] or [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up!&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==&lt;br /&gt;
The OWASP Top 10 was translated to Hebrew and is [[OWASP_Top10_Hebrew|available for download]]. &lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
&lt;br /&gt;
; '''[[OWASP_Israel_2013|OWASP Israel 2013]] Conference held on October 1st with approximately 450 participants!'''&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_05&amp;diff=152668</id>
		<title>OWASP Israel 2013 05</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_05&amp;diff=152668"/>
				<updated>2013-06-01T12:35:16Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The next meeting for the Israel chapter of OWASP will take place on May 28th, starting from 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held at the EMC Center of Excellence - ‎7 Hamada St., Herzliya. If you are planning on attending, please confirm your participation to rsvp@owasp.org.il even if it is not definite.&lt;br /&gt;
&lt;br /&gt;
The meeting’s agenda will be: &lt;br /&gt;
&lt;br /&gt;
''' 17:00 – 17:30 Gathering, pizza, and drinks'''&lt;br /&gt;
&lt;br /&gt;
''' 17:30 – 17:45 Opening note '''&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – 18:30 DoS Made Easy – Yaniv Simsolo ''' ([[Media:OWASP IL 2013 05 Denial of Service - Made Easy.pdf|download presentation]])‎&lt;br /&gt;
&lt;br /&gt;
Modern systems rely on multiple layers and distributed architecture. Availability and redundancy considerations implemented in systems' architecture ought to prevent successful DOS attacks. However, common modern system' architecture incorporate several security key holes in many modern and cutting edge systems, enabling effortless and effective DOS attacks. The presentation will review some of this security key holes, and the DOS factors thereof.&lt;br /&gt;
&lt;br /&gt;
''' 18:30 – 19:15 Publishing Enterprise Web Applications on BYOD using a Granular Trust Model – Shachaf Levi, Intel''' ([[Media:OWASP IL 2013 05 Publishing Enterprise Web Applications to BYOD using a Granular Trust Model.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
* A web application gateway for mobile devices based on their trust level in a dynamic matter (and the web applications' requirement of being designed for mobile friendly UI)&lt;br /&gt;
* A software-based one-time password (OTP) solution that requires no additional hardware and is customized two-factor authentication – creating a seamless authentication experience.&lt;br /&gt;
* A single sign-on process that uses Kerberos protocol transition.&lt;br /&gt;
* A new approach to information security dynamic and granular security controls based on trust calculation and web content that is exposed based on it.&lt;br /&gt;
* A client that collects data, sends it to a broker that calculate the trust level of the device and location, and based on that, exposes specific web sites&lt;br /&gt;
&lt;br /&gt;
'''19:15 – 19:30 Coffee break'''&lt;br /&gt;
&lt;br /&gt;
'''19:30 – 20:15 Lessons and Impressions cyber attacks on Israel – Nimrod Luria'''&lt;br /&gt;
&lt;br /&gt;
In the presentation I will review the existing issues in deploying and protecting web sites and why this cannot ensure availability and survivability. The presentation will include live demos of methods of securing web sites against today threats.&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_05_Denial_of_Service_-_Made_Easy.pdf&amp;diff=152667</id>
		<title>File:OWASP IL 2013 05 Denial of Service - Made Easy.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_05_Denial_of_Service_-_Made_Easy.pdf&amp;diff=152667"/>
				<updated>2013-06-01T12:34:02Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_05&amp;diff=152663</id>
		<title>OWASP Israel 2013 05</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2013_05&amp;diff=152663"/>
				<updated>2013-06-01T10:37:06Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The next meeting for the Israel chapter of OWASP will take place on May 28th, starting from 17:00. &lt;br /&gt;
&lt;br /&gt;
The meeting will be held at the EMC Center of Excellence - ‎7 Hamada St., Herzliya. If you are planning on attending, please confirm your participation to rsvp@owasp.org.il even if it is not definite.&lt;br /&gt;
&lt;br /&gt;
The meeting’s agenda will be: &lt;br /&gt;
&lt;br /&gt;
''' 17:00 – 17:30 Gathering, pizza, and drinks'''&lt;br /&gt;
&lt;br /&gt;
''' 17:30 – 17:45 Opening note '''&lt;br /&gt;
&lt;br /&gt;
''' 17:45 – 18:30 DoS Made Easy – Yaniv Simsolo '''&lt;br /&gt;
&lt;br /&gt;
Modern systems rely on multiple layers and distributed architecture. Availability and redundancy considerations implemented in systems' architecture ought to prevent successful DOS attacks. However, common modern system' architecture incorporate several security key holes in many modern and cutting edge systems, enabling effortless and effective DOS attacks. The presentation will review some of this security key holes, and the DOS factors thereof.&lt;br /&gt;
&lt;br /&gt;
''' 18:30 – 19:15 Publishing Enterprise Web Applications on BYOD using a Granular Trust Model – Shachaf Levi, Intel''' ([[Media:OWASP IL 2013 05 Publishing Enterprise Web Applications to BYOD using a Granular Trust Model.pdf|download presentation]])&lt;br /&gt;
&lt;br /&gt;
* A web application gateway for mobile devices based on their trust level in a dynamic matter (and the web applications' requirement of being designed for mobile friendly UI)&lt;br /&gt;
* A software-based one-time password (OTP) solution that requires no additional hardware and is customized two-factor authentication – creating a seamless authentication experience.&lt;br /&gt;
* A single sign-on process that uses Kerberos protocol transition.&lt;br /&gt;
* A new approach to information security dynamic and granular security controls based on trust calculation and web content that is exposed based on it.&lt;br /&gt;
* A client that collects data, sends it to a broker that calculate the trust level of the device and location, and based on that, exposes specific web sites&lt;br /&gt;
&lt;br /&gt;
'''19:15 – 19:30 Coffee break'''&lt;br /&gt;
&lt;br /&gt;
'''19:30 – 20:15 Lessons and Impressions cyber attacks on Israel – Nimrod Luria'''&lt;br /&gt;
&lt;br /&gt;
In the presentation I will review the existing issues in deploying and protecting web sites and why this cannot ensure availability and survivability. The presentation will include live demos of methods of securing web sites against today threats.&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_05_Publishing_Enterprise_Web_Applications_to_BYOD_using_a_Granular_Trust_Model.pdf&amp;diff=152662</id>
		<title>File:OWASP IL 2013 05 Publishing Enterprise Web Applications to BYOD using a Granular Trust Model.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2013_05_Publishing_Enterprise_Web_Applications_to_BYOD_using_a_Granular_Trust_Model.pdf&amp;diff=152662"/>
				<updated>2013-06-01T10:35:25Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=152661</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=152661"/>
				<updated>2013-06-01T10:14:56Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Previous OWASP Israel Conferences and Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:ofer.maor@owasp.org Ofer Maor]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board:'''[mailto:ofer@shezaf.com Ofer Shezaf]''' (Chapter Founder), '''Avi Douglen''', '''Or Katz''',''' Adi Sharabani''',''' Ofer Maor''', '''Ory Segal'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Ofer Shezaf, Ofer Maor&lt;br /&gt;
* Mailing List Management: Ofer Shezaf, Avi Douglen, Ofer Maor&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September (see [[OWASP_Israel_201|2012 conference information]] for more details)&lt;br /&gt;
* Periodical meetings. If you would like to host a meeting or speak in one contact [mailto:ofer.maor@owasp.org Ofer Maor] or [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up!&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==&lt;br /&gt;
The OWASP Top 10 was translated to Hebrew and is [[OWASP_Top10_Hebrew|available for download]]. &lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
; [[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013 with 80 participants.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=152660</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=152660"/>
				<updated>2013-06-01T10:11:17Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: /* Previous OWASP Israel Conferences and Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:ofer.maor@owasp.org Ofer Maor]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board:'''[mailto:ofer@shezaf.com Ofer Shezaf]''' (Chapter Founder), '''Avi Douglen''', '''Or Katz''',''' Adi Sharabani''',''' Ofer Maor''', '''Ory Segal'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Ofer Shezaf, Ofer Maor&lt;br /&gt;
* Mailing List Management: Ofer Shezaf, Avi Douglen, Ofer Maor&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September (see [[OWASP_Israel_201|2012 conference information]] for more details)&lt;br /&gt;
* Periodical meetings. If you would like to host a meeting or speak in one contact [mailto:ofer.maor@owasp.org Ofer Maor] or [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up!&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==&lt;br /&gt;
The OWASP Top 10 was translated to Hebrew and is [[OWASP_Top10_Hebrew|available for download]]. &lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
; [[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=152659</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=152659"/>
				<updated>2013-06-01T10:10:28Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The chapter leader is '''[mailto:ofer.maor@owasp.org Ofer Maor]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board:'''[mailto:ofer@shezaf.com Ofer Shezaf]''' (Chapter Founder), '''Avi Douglen''', '''Or Katz''',''' Adi Sharabani''',''' Ofer Maor''', '''Ory Segal'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Ofer Shezaf, Ofer Maor&lt;br /&gt;
* Mailing List Management: Ofer Shezaf, Avi Douglen, Ofer Maor&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Activity ==&lt;br /&gt;
&lt;br /&gt;
* An annual conference, usually in September (see [[OWASP_Israel_201|2012 conference information]] for more details)&lt;br /&gt;
* Periodical meetings. If you would like to host a meeting or speak in one contact [mailto:ofer.maor@owasp.org Ofer Maor] or [mailto:ofer@shezaf.com Ofer Shezaf].&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew translation]].&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up!&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 in Hebrew ==&lt;br /&gt;
The OWASP Top 10 was translated to Hebrew and is [[OWASP_Top10_Hebrew|available for download]]. &lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
; [[OWASP_Israel_2013_05|OWASP Israel May 2013]] was held at RSA on May 28th 2013'''&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2013_02|OWASP Israel February 2013]]  meeting was held at E&amp;amp;Y on February 12th 2013 ([[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]).&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2012|OWASP Israel 2012 conference]] Was held at the IDC on Sep 5th 2012.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2011|OWASP Israel 2011 Conference]] Was held in the IDC in Herzliya on Sep 15th 2011, with about 350 attendees. &lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010|OWASP Israel 2010 Conference]] Was held in the IDC in Herzliya on Sep 6th 2010 with about 150 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_06|OWASP Israel Jun-2010]] meeting was held in IBM/Watchfire in Herzliya on Jun 22nd 2010.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_02|OWASP Israel Feb-2010]] meeting was held in Amdocs in Ra'anana on Feb 9th 2010 with over 70 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2010_01|OWASP Israel Jan-2010]] meeting was held in Breach Security in Herzliya on Jan 12th 2010 with over 60 attendees.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009_12|OWASP Israel Dec-2009]] meeting was held in IBM/Watchfire in Herzliya in Dec 2009.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Israel_2009|OWASP Israel 2009]] conference was held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009. &lt;br /&gt;
: You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]].&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_ISRAEL_2013_02_Hebrew&amp;diff=151150</id>
		<title>OWASP ISRAEL 2013 02 Hebrew</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_ISRAEL_2013_02_Hebrew&amp;diff=151150"/>
				<updated>2013-05-07T21:30:21Z</updated>
		
		<summary type="html">&lt;p&gt;Oshezaf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div dir=&amp;quot;rtl&amp;quot; lang=&amp;quot;he&amp;quot;&amp;gt;&lt;br /&gt;
מפגש פברואר 2013 של OWASP נערך ב 12.2.2013, יום שלישי במרכז ההדרכה של ארנסט אנד יאנג ברחוב מיטב 6, תל אביב (&lt;br /&gt;
[https://www.owasp.org/index.php/File:OWASP_IL_EY_MAP.png מפה]).&lt;br /&gt;
&lt;br /&gt;
סדר יום של המפגש:&lt;br /&gt;
 &lt;br /&gt;
'''17:00 – 17:30 התאספות, פיצה ושתיה קלה.'''&lt;br /&gt;
 &lt;br /&gt;
'''17:30 – 17:45 דברי פתיחה.'''&lt;br /&gt;
 &lt;br /&gt;
'''17:45 – 18:30 איציק קוטלר – היכרות עם Pythonect''' ([https://www.owasp.org/images/4/4a/OWASP_IL_2013_02_Itzik_Kotler_Pythonect_for_SP.pdf מצגת])&lt;br /&gt;
&lt;br /&gt;
Pythonect היא שפת תכנות חדשה וניסיונית אשר תומכת בפרדיגמת תכנות של Dataflow Programming.&lt;br /&gt;
השפה מנסה לשלב בין הקלילות של Shell Scripting (וכל מה שנגזר מכך, כולל לדוגמא: Implicit Parallelism) והגמישות של שפת Python.&lt;br /&gt;
Pythonect נפלאה ליצירה מהירה של כלי מחקר ובדיקה של אבטחת מידע, החל מ- Fuzzers ועד Revesre Engineering ו- Penetration Testing.&lt;br /&gt;
בהרצאה זאת אסביר על Pythonect ובנוסף אראה דוגמאות קוד שימחישו את היתרונות של השפה.&lt;br /&gt;
  &lt;br /&gt;
'''18:30 – 19:15 רננה פרידליך - הפשע כן משתלם - אלא אם כן נתפסת!!'''&lt;br /&gt;
([https://www.owasp.org/images/2/27/OWASP_IL_2013_02_Renana_Friedlich_CrimeDoesPay.pdf מצגת])&lt;br /&gt;
&lt;br /&gt;
בואו נגיד שבאמת נתפסת!! - מה אם × בוצע במדינה א', הפרוקסי יושב במדינה ב', והמטרה במדינה ג'?&lt;br /&gt;
* היכן נמצאת הסמכות השיפוטית?&lt;br /&gt;
* מהם תהליכי ההאשמה וההרשעה?&lt;br /&gt;
* לפי חוקים של איזו מדינה תישפטו?&lt;br /&gt;
 &lt;br /&gt;
האם ביצוע SQL INJECTION יכול להשליככם לכלא ?האם XSS יוכל?&lt;br /&gt;
* מה בעצם &amp;quot;עבירת מחשב&amp;quot;?&lt;br /&gt;
 &lt;br /&gt;
בנוסף, אנחנו נדבר גם על שיתופי פעולה בין מדינות בנושא עביר× מחשב:&lt;br /&gt;
* מה קיים בין המדינות ומה לא?&lt;br /&gt;
* מהם סיכוייך להיות מוסגר למדינה אחרת בעקבות עבירו× מחשב?&lt;br /&gt;
 &lt;br /&gt;
אך בואו נגיד שבאמת הורשעתם...&lt;br /&gt;
* האם ידעת שיש אפשרות לקבל מאסר עולם על עבירות מחשב?&lt;br /&gt;
* מצד שני.... האם זה באמת כ&amp;quot;כ קשה לצאת נקי מכל העסק?&lt;br /&gt;
 &lt;br /&gt;
הרצאה זו תענה על כל השאלות הנ&amp;quot;ל ותקשר את עולם עבירות המחשב בסביבות WEB לעולם עבירות המחשב.&lt;br /&gt;
 &lt;br /&gt;
'''19:15 – 19:30 הפסקת קפה'''&lt;br /&gt;
 &lt;br /&gt;
'''19:30 – 20:15 פנל WAFEC עופר שיזף מנחה'''&lt;br /&gt;
&lt;br /&gt;
(הפאנל לא כלל מצגת, ניתן למצוא פרטים נוספים על WAFEC [http://wafec.webasppsec.org באתר]])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WAFEC, המדריך להערכת Web Application Firewalls, שפורסם לראשונה ב- 2006 הוא למעשה הסטנדרט  ללימוד ולהערכת Web Application Firewalls ונעשה בו תכופות שימוש במכרזים בתחום. חברי קבוצת הפרויקט, הכוללים את כל המי-ומי בתחום בעולם (ואם שכחנו אותך את/ה מוזמנ/ת להצטרף) עובדת בימים אילו על הגרסה החדשה של המדריך. כחלק מכנס OWASP נפגיש בין מספר מהמחברים של הגרסה החדשה, כולם מומחים עולמיים בתחום, לדיון במצב טכנולוגית ה-WAF, מצב התעשייה, והאתגרים בכתיבת מדריך להערכת WAFs. הפנל יהיה אינטראקטיבי ויתבסס על שאלות שלי ושלכם. אשמח לקבל שאלות מראש!&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Oshezaf</name></author>	</entry>

	</feed>