This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP NYC AppSec 2008 Conference-SPEAKER-Andres Riancho"

From OWASP
Jump to: navigation, search
(Small Biography of Andres Riancho)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
== Andres Riancho - Bio ==
 
== Andres Riancho - Bio ==
  
Andres Riancho is an experienced penetration tester, information security researcher and programmer. He is the project leader of the w3af project; which aims to find and exploit all web application vulnerabilities. Since the public presentation of w3af in 2007, Andres has been invited to talk at international information security conferences in Europe, South America and North America.
+
[http://www.bonsai-sec.com/ Andrés Riancho] is an information security researcher and founder of [http://www.bonsai-sec.com/ Bonsai], where he is mainly involved in [http://www.bonsai-sec.com/en/services/penetration-testing.php Penetration Testing] and Vulnerability Research. In the research field, he discovered critical vulnerabilities in IPS appliances from 3com and ISS; and contributed with SAP research performed at his former employer.  
 +
 
 +
His main focus has always been the [http://www.bonsai-sec.com/ Web Application Security] field, in which he developed [http://w3af.sf.net/ w3af] a Web Application Attack and Audit Framework used extensively by penetration testers and security consultants. Andrés has spoken and hold trainings at many security conferences around the globe, like OWASP World C0n (USA), CanSecWest (Canada), T2 (Finland) and ekoparty (Buenos Aires).
 +
 
 +
Andrés founded [http://www.bonsai-sec.com/ Bonsai] in 2009 in order to further research into automated [http://www.bonsai-sec.com/ Web Application Vulnerability detection] and exploitation.
  
 
== Talk abstract ==
 
== Talk abstract ==
Line 7: Line 11:
 
Web application auditing and exploiting is an art, but even art needs help of tools to make the process faster and more accurate. Right now open source tools like nikto, wapiti, pantera and others try to find vulnerabilities in web applications but lack many features and configuration options. Comercial tools have the features, at the expense of high product costs, and aren't as dynamic as open source projects.
 
Web application auditing and exploiting is an art, but even art needs help of tools to make the process faster and more accurate. Right now open source tools like nikto, wapiti, pantera and others try to find vulnerabilities in web applications but lack many features and configuration options. Comercial tools have the features, at the expense of high product costs, and aren't as dynamic as open source projects.
  
w3af ( Web Application Attack and Audit Framework ) is an open source project that aims to automate the detection and explotation of all web application vulnerabilities. The project objective is to become an open platform where anyone can contribute with code and new technics. w3af is extended using plugins that are fully written in python, right now the project has more than 80 plugins and 30K lines of code!
+
[http://w3af.sf.net/ w3af] ( Web Application Attack and Audit Framework ) is an open source project that aims to automate the detection and explotation of all web application vulnerabilities. The project objective is to become an open platform where anyone can contribute with code and new technics. [http://w3af.sf.net/ w3af] is extended using plugins that are fully written in python, right now the project has more than 80 plugins and 30K lines of code!
  
The framework is divided into three phases: discovery, audit and attack. All plugins smoothly communicate with each other and _work together_ to achieve the objective; w3af replaces standalone tools and makes web penetration testing as easy as possible; any wierd characteristic can be added as a plugin and consume all the features of the framework.  
+
The framework is divided into three phases: discovery, audit and attack. All plugins smoothly communicate with each other and '''work together''' to achieve the objective; w3af replaces standalone tools and makes web penetration testing as easy as possible; any wierd characteristic can be added as a plugin and consume all the features of the framework.  
  
w3af implements many exploit plugins and features to aid this process, not less important are the discovery and audit plugins that will find those vulnerabilities for you to exploit! w3af, one tool to rule them all.
+
[http://w3af.sf.net/ w3af] implements many exploit plugins and features to aid this process, not less important are the discovery and audit plugins that will find those vulnerabilities for you to exploit! [http://w3af.sf.net/ w3af] one tool to rule them all.
  
 
My talk will introduce this tool to new users, while showing it's features and the new GUI.
 
My talk will introduce this tool to new users, while showing it's features and the new GUI.

Latest revision as of 22:58, 15 April 2009

Andres Riancho - Bio

Andrés Riancho is an information security researcher and founder of Bonsai, where he is mainly involved in Penetration Testing and Vulnerability Research. In the research field, he discovered critical vulnerabilities in IPS appliances from 3com and ISS; and contributed with SAP research performed at his former employer.

His main focus has always been the Web Application Security field, in which he developed w3af a Web Application Attack and Audit Framework used extensively by penetration testers and security consultants. Andrés has spoken and hold trainings at many security conferences around the globe, like OWASP World C0n (USA), CanSecWest (Canada), T2 (Finland) and ekoparty (Buenos Aires).

Andrés founded Bonsai in 2009 in order to further research into automated Web Application Vulnerability detection and exploitation.

Talk abstract

Web application auditing and exploiting is an art, but even art needs help of tools to make the process faster and more accurate. Right now open source tools like nikto, wapiti, pantera and others try to find vulnerabilities in web applications but lack many features and configuration options. Comercial tools have the features, at the expense of high product costs, and aren't as dynamic as open source projects.

w3af ( Web Application Attack and Audit Framework ) is an open source project that aims to automate the detection and explotation of all web application vulnerabilities. The project objective is to become an open platform where anyone can contribute with code and new technics. w3af is extended using plugins that are fully written in python, right now the project has more than 80 plugins and 30K lines of code!

The framework is divided into three phases: discovery, audit and attack. All plugins smoothly communicate with each other and work together to achieve the objective; w3af replaces standalone tools and makes web penetration testing as easy as possible; any wierd characteristic can be added as a plugin and consume all the features of the framework.

w3af implements many exploit plugins and features to aid this process, not less important are the discovery and audit plugins that will find those vulnerabilities for you to exploit! w3af one tool to rule them all.

My talk will introduce this tool to new users, while showing it's features and the new GUI.