This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Romania InfoSec Conference 2013"
Dan Vasile (talk | contribs) |
Oana Cornea (talk | contribs) |
||
Line 32: | Line 32: | ||
OWASP Romania is happy to announce the Call for Papers for OWASP Romania InfoSec Conference 2013 a one day Security and Hacking Conference. It will take place on 25th of October, 2013 - Bucharest, Romania. <br> | OWASP Romania is happy to announce the Call for Papers for OWASP Romania InfoSec Conference 2013 a one day Security and Hacking Conference. It will take place on 25th of October, 2013 - Bucharest, Romania. <br> | ||
To be part of this submit your paper [https://docs.google.com/a/owasp.org/forms/d/1PkQZwzihj5rJq7GBBJEUBObTL1yDfMB8eQdWVcxiHm0/viewform here]. | To be part of this submit your paper [https://docs.google.com/a/owasp.org/forms/d/1PkQZwzihj5rJq7GBBJEUBObTL1yDfMB8eQdWVcxiHm0/viewform here]. | ||
+ | |||
+ | = Agenda = | ||
+ | {|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" | ||
+ | |- | ||
+ | | align="center" style="background:#4B0082;" colspan="2" | <span style="color:#ffffff"> | ||
+ | '''CONFERENCE (Friday 25th of October)''' </span> | ||
+ | |- | ||
+ | |- | ||
+ | | style="width:20%" valign="middle" bgcolor="#CCCCEE" align="center" colspan="0" | '''Date''' | ||
+ | | style="width:80%" valign="middle" bgcolor="#CCCCEE" align="center" colspan="0" | '''Location''' | ||
+ | |- | ||
+ | | valign="middle" bgcolor="#EEEEEE" align="center" | ''' Friday 25th of October ''' | ||
+ | | valign="middle" bgcolor="#EEEEEE" align="left" | '''Venue Location: University "Politehnica" of Bucharest<br> | ||
+ | Venue Address: Splaiul Independentei nr. 313, sector 6, Bucuresti, ROMANIA; <br> | ||
+ | Postal cod: RO-060042'''<br> | ||
+ | Venue Map: [https://plus.google.com/101033585760098377632/about] | ||
+ | |- | ||
+ | | align="center" style="background:#CCCCEE;" colspan="2" | '''Price and registration''' | ||
+ | |- | ||
+ | | align="center" style="background:#EEEEEE;" colspan="2" | This event is '''FREE''' <br> | ||
+ | '''Registration Link''': <br>'''<br> | ||
+ | <br> | ||
+ | |- | ||
+ | |} | ||
+ | <br> | ||
+ | {|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="4" | ||
+ | | style="width:100%" valign="middle" height="40" bgcolor="#CCCCEE" align="center" colspan="6" | '''Conference Details ''' | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Time''' | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Title''' | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Speaker''' | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 15 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Introduction & Welcome | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Oana Cornea | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Introduction to OWASP & Bucharest Event, Schedule for the Day | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 45 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Secure Development LifeCycle<br> | ||
+ | (aka "The good the bad and the ugly implementations") | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Martin Knobloch | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Software development is not THAT new anymore, but it is still a fast changing work environment.<br> | ||
+ | We do develop more functionality faster, and the applications do even look more pretty!<br> | ||
+ | ..but what about security? Guess what, it is not a developers first priority!<br> | ||
+ | This presentation is about how to implement secure development strategy without blaming and bashing on developers. | ||
+ | Instead of increasing the workload of the development-team with more process overhead, (security) quality gates, etc | ||
+ | Lets help developer by implementing impalpable mechanism! | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 45 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Practical Defense with mod_security Web Application Firewall | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Marian Ventuneac | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Marian will introduce the mod_security Web Application Firewall (WAF). This session will be a practical demonstration of mitigating security risks for a sample vulnerable Web application. | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 45 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Scanning Romania with Nessus (web part) | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Adrian Furtuna | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | This talk presents the results of a passive vulnerability scan performed against all Romanian IP addresses, targeting all web servers listening on port 80. <br> | ||
+ | The research was performed against multiple network packet captures selected from the output of Carna botnet, which scanned Romania in July 2012. | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 45 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Reading the minds | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Anatolie Prisacaru | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | In my presentation I will focus the analysis of how web browsers and extensions keep in memory. I will start with a quick introduction on how to dump and analyse processes' random access memory maps on a Linux based operating system with basic tools and then run a quick code review to see a couple of weak points, find their Achilles' heel and finally prove why statements like "Your sensitive data is encrypted _locally_ before upload so even LastPass cannot get access to it" can be pretty misleading. | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 45 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Resolving 3 Common threats in MVC (A4 - Insecure Direct Object References , A3 - Cross-Site Scripting (XSS) , A8 - Cross-Site Request Forgery (CSRF) ) | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andrei Ignat | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Any website is confronted with hackers. The security measures are easy to follow - and this presentation shares to you this knowledge. | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 45 mins | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hacking the Wordpress ecosystem | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Dan Catalin Vasile | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | This talk came from the personal need of securing multiple instances of Wordpress. An OWASP Project was initiated to gather the knowledge around this subject in one place.<br> | ||
+ | The presentation will address the following subjects:<br> | ||
+ | - securing the installation process<br> | ||
+ | - server side measures: backup, securing login, antivirus, regular scan, web firewall, monitoring, permissions, etc.<br> | ||
+ | - client side measures: personal devices security, password management, communication channels, etc.<br> | ||
+ | - hacking the infrastructure<br> | ||
+ | - hacking plugins | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD <br>(45 mins) | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
+ | | style="width:25%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | | ||
+ | |- | ||
+ | |} | ||
=Sponsors = | =Sponsors = |
Revision as of 20:12, 23 September 2013
|
OWASP Romania InfoSec Conference |
Welcome
|