This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "LatamTour2012 BA Agenda"
From OWASP
(3 intermediate revisions by one other user not shown) | |||
Line 42: | Line 42: | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00 | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00 | ||
− | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Post Explotation: PHP Backdoor Introduction |
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Claudio Caracciolo | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Claudio Caracciolo | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CCaracciolo_PHPBackdoor.pdf]] |
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45 | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45 | ||
− | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Consecuencias de un Administrador "perezoso" |
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Cristian Borghello | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Cristian Borghello | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CBorghello_ConsecuenciasdeunAdmin.pdf]] |
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15 | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15 | ||
Line 57: | Line 57: | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45 | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45 | ||
− | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Datos Personales en el Ciclo de Vida de Desarrollo Seguro |
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pablo Romanos | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pablo Romanos | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:PRomanos_DatosPersonales.pdf]] |
|- | |- | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15 | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15 | ||
− | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | HTExploit - Bypassing htaccess and beyond |
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Maximiliano Soler, Matias Katz | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Maximiliano Soler, Matias Katz | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:MSoler_MKatz_HTExploit.pdf]] |
|- | |- | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45 | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45 | ||
− | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Intro a HTML5 |
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andres Riancho | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andres Riancho | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:OWASP_Latam_2012_-_HTML5_-_Andres_Riancho.pdf]] |
|- | |- | ||
|- | |- | ||
Line 88: | Line 88: | ||
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30 | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30 | ||
− | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Modelado de Amenazas: Una Introducción |
| style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti | ||
− | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:HRacciatti_ModeladodeAmenazas.pdf]] |
|- | |- | ||
|- | |- |
Latest revision as of 01:10, 5 June 2012
CURSO | |
OWASP Latam Tour Argentina 2012 | |
Descripcion y Objetivo | |
| |
Fecha | Lugar |
14 de Mayo de 2012 | Aula Magna - Universidad de la Marina Mercante (UdeMM) ubicado en Av. Rivadavia 2258, Ciudad Autónoma de Buenos Aires, Capital Federal, Argentina. |
Precio y Registracion | |
GRATIS - Registrate AQUI |
DETALLES DE LA JORNADA | |||||
Horario | Modulo | Ponente | Detalles | ||
09:00 - 09:15 | Inició y presentación del evento | Martín Tartarelli, Pablo Romanos | |||
09:15 - 10:00 | Post Explotation: PHP Backdoor Introduction | Claudio Caracciolo | File:CCaracciolo PHPBackdoor.pdf | ||
10:00 - 10:45 | Consecuencias de un Administrador "perezoso" | Cristian Borghello | File:CBorghello ConsecuenciasdeunAdmin.pdf | ||
10:45 - 11:15 | Break | ||||
11:15 - 11:45 | Datos Personales en el Ciclo de Vida de Desarrollo Seguro | Pablo Romanos | File:PRomanos DatosPersonales.pdf | ||
11:45 - 12:15 | HTExploit - Bypassing htaccess and beyond | Maximiliano Soler, Matias Katz | File:MSoler MKatz HTExploit.pdf | ||
12:15 - 12:45 | Intro a HTML5 | Andres Riancho | File:OWASP Latam 2012 - HTML5 - Andres Riancho.pdf | ||
12:45 - 14:00 | Almuerzo | ||||
14:00 - 14:45 | Tu sitio web: un arma para el cibercrimen | Sebastian Bortnik | TBD | ||
14:45 - 15:30 | Modelado de Amenazas: Una Introducción | Hernan Racciatti | File:HRacciatti ModeladodeAmenazas.pdf | ||
15:30 - 16:15 | Desarrollo seguro con herramientas y procesos OWASP | Fabio Cerullo | TBD | ||
16:15 - 16:45 | Break | ||||
16:45 - 17:45 | Panel de Hacktivismo | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio | TBD | ||
17:45 - 18:00 | Entrega de premios y cierre del evento | Martín Tartarelli |