This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Bucharest AppSec Conference 2016 Workshops
 Workshop | |||||
| Time | Title | Trainers | Description | ||
|  9:00 - 17:00 | 
 OWASP Top 10 Vulnerabilities – Discover, Exploit, Remediate | 
 Adrian Furtună – Founder & Ethical Hacker – VirtualStorm Security  Ionuţ Ambrosie – Security Consultant – KPMG Romania  | 
 Description:The purpose of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks.  We will discuss each type of vulnerability described in the OWASP Top 10 project and we will be practicing manual discovery and exploitation techniques. Furthermore, a set of useful security testing tools will be presented and used during the workshop. 
 Of course, we will also present safe ways in which the identified vulnerabilities can be eliminated or mitigated in production environments.
 
 Seats available:	20 (first-come, first served)  | ||
|  9:00 - 17:00 | 
 Secure Web Applications in Java | 
 Cristian Serban- AppSec Architecture Manager  Lucian Suta - Software Security Trainer and Consultant  | 
 Description: Everybody is familiar with OWASP Top 10, but how is that applicable when you write Java web applications using the Spring Framework, JSP, or FreeMarker templates? What are the security features built into the most common Java frameworks and how to apply security principles such as ‘defense in depth’ in order to build robust applications. Together we will build secure coding and secure code review skills, uncover and protect against some of the most common vulnerabilities in Java code. Intended audience: Web application developers, security testers, quality assurance personnel, people passionate about web security Seats available:	20 (first-come, first served) 
  | ||
|  9:00 - 17:00 | 
 Shellcode Development and Exploiting | 
 Razvan Deaconescu- Assistant Professor at University POLITEHNICA of Bucharest  Mihai Țigănuș - Master Student at University POLITEHNICA of Bucharest  | 
 Description: Shellcodes are small pieces of executable code that provide arbitrary functionality to a given program. They are usually obtained from assembly source code and used in runtime application security to exploit a vulnerability in the program and alter the execution flow, i.e. arbitrary code execution attack.  In this training we will provide you with the know-how and skills to create shellcodes and construct basic attack vectors using shellcodes. You will better understand how programs and processes work.  The training is highly practical. We will use a Linux environment and common Linux tools for static and dynamic analysis, shellcode creation and exploiting. The training will feature hands-on activities such as: 
 We will present different scenarios for vulnerable programs and then create the shellcode-based attack vectors to exploit them. Outcome: After this training you will be able to create shellcodes and assembly-based binary blobs and use them for for exploiting or executable hardening. You will increase your skills in using assembly language and in working with binary exploration tools. You will understand shellcode-based attacks and you will gain basic understanding of shellcode-based attack requirements and how to mitigate them.  Intended Audience: System-level developers, security researchers, people interested in runtime appplication security and binary exploitation  
 Seats available:	20 (first-come, first served)  | ||
|  9:00 - 17:00 | 
 Practical Cryptography on the Internet | 
Sergiu Costea - Security Researcher at University POLITEHNICA of Bucharest |  Description: Cryptography is used throughout the Internet to keep information safe. It is everywhere, from banking security tokens to Youtube streams. Simply authenticating into Facebook performs tens of different cryptographic operations to establish a secure connection. Cryptography mostly operates under the hood — we use it without having to worry about how it works. However, when something in the crypto world cracks, it cracks loudly. Heartbleed, compromised certificate authorities, identity theft, mass surveillance, bitcoin exploits worth millions of dollars — they all originate in the complex layer of cryptographic algorithms and have negative impact on our lives. In this session, we will take a very practical look at cryptography and see how it works on the Internet. Some of the topics we will cover include: 
 The training will feature many guided hands-on activities. These include, but are not limited to: creating certificate hierarchies, configuring custom certificates on clients and servers, modifying security policies, impersonating “seemingly secure” identities, downgrading connections, and extracting information from secure HTTPS sessions. We'll also explore how easily crypto breaks when used improperly, looking back at notable recent attacks and what made them possible. Outcome: After this training you will be able to: 
 Intended Audience: Network and web security engineers, security researchers, web developers Skill Level: intermediate, basic Linux command line skills, basic knowledge of networking, basic knowledge of HTTP  
 Seats available:	20 (first-come, first served)  | ||