This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mrb Scratchpad"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
| Line 10: | Line 10: | ||
<td height="40" align="center" bgcolor="#ff6600" valign="middle" width="200"><b>Web 2.0</b> | <td height="40" align="center" bgcolor="#ff6600" valign="middle" width="200"><b>Web 2.0</b> | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="#666699" width="67" valign="middle">07:30- | + | <td bgcolor="#666699" width="67" valign="middle">07:30-09:00 |
<td colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Registration | <td colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Registration | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="#666699" width="67" valign="middle">09:00-09: | + | <td bgcolor="#666699" width="67" valign="middle">09:00-09:15 |
| − | <td height=" | + | <td height="30" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Welcome and Opening Remarks |
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td bgcolor="#666699" width="67" valign="middle"> | + | <td bgcolor="#666699" width="67" valign="middle">9:15-10:15 |
<td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Keynote: Joe Jarzombek | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Keynote: Joe Jarzombek | ||
| + | <tr valign="bottom"> | ||
| + | <td bgcolor="#666699" width="67" valign="middle">10:15-11:30 | ||
| + | <td height="30" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Coffee Break | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
<td bgcolor="#666699" width="67" valign="middle">11:00-11:50 | <td bgcolor="#666699" width="67" valign="middle">11:00-11:50 | ||
| Line 25: | Line 28: | ||
<td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Understanding the Implications of Cloud Computing on Application Security <br>Dennis Hurst | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Understanding the Implications of Cloud Computing on Application Security <br>Dennis Hurst | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="#666699" width="67" valign="middle">12:00- | + | <td height="120" bgcolor="#666699" width="67" valign="middle">12:00-12:50 |
<td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">Software Assurance Maturity Model (SAMM) <br>Pravir Chandra | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">Software Assurance Maturity Model (SAMM) <br>Pravir Chandra | ||
<td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">The Case of Promiscuous Parameters and other Ongoing Capers in Web Security <br>Jacob West | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">The Case of Promiscuous Parameters and other Ongoing Capers in Web Security <br>Jacob West | ||
| Line 31: | Line 34: | ||
<td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Transparent Proxy Abuse <br>Robert Auger | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Transparent Proxy Abuse <br>Robert Auger | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" bgcolor="#666699" width="67" valign="middle"> | + | <td height="60" bgcolor="#666699" width="67" valign="middle">13:00-13:50 |
| + | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Lunch | ||
| + | <tr valign="bottom"> | ||
| + | <td height="120" bgcolor="#666699" width="67" valign="middle">14:00-14:50 | ||
<td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">DISA's Application Security and Development STIG: How OWASP Can Help You <br>Jason Li | <td height="120" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">DISA's Application Security and Development STIG: How OWASP Can Help You <br>Jason Li | ||
<td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">OWASP ModSecurity Core Rule Set Project <br>Ryan C. Barnett | <td height="120" align="center" bgcolor="#808000" width="200" valign="middle" width="200">OWASP ModSecurity Core Rule Set Project <br>Ryan C. Barnett | ||
| Line 37: | Line 43: | ||
<td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Fracturing Flex For Fun- An Alliterative Attackers Approach <br>Jon Rose/Kevin Stadmeyer | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Fracturing Flex For Fun- An Alliterative Attackers Approach <br>Jon Rose/Kevin Stadmeyer | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | + | <td height="120" bgcolor="#666699" width="67" valign="middle">15:00-15:50 | |
| − | |||
| − | |||
| − | <td height="120" bgcolor="#666699" width="67" valign="middle"> | ||
<td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200"> Defend Yourself: Integrating Real Time Defenses into Online Applications <br>Michael Coates | <td height="60" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200"> Defend Yourself: Integrating Real Time Defenses into Online Applications <br>Michael Coates | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Finding the Hotspots: Web-security testing with the Watcher tool <br>Chris Weber | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Finding the Hotspots: Web-security testing with the Watcher tool <br>Chris Weber | ||
| Line 46: | Line 49: | ||
<td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Social Zombies: Your Friends Want to Eat Your Brains <br>Tom Eston/Kevin Johnson | <td height="120" align="center" bgcolor="#ff6600" width="200" valign="middle" width="200">Social Zombies: Your Friends Want to Eat Your Brains <br>Tom Eston/Kevin Johnson | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle"> | + | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">16:00-16:50 |
<td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">The ESAPI Web Application Firewall <br>Arshan Dabirsiaghi | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">The ESAPI Web Application Firewall <br>Arshan Dabirsiaghi | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">One Click Ownage <br>Ferruh Mavituna | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">One Click Ownage <br>Ferruh Mavituna | ||
| Line 53: | Line 56: | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Web Application Security Scanner Evaluation Criteria <br>Brian Shura | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Web Application Security Scanner Evaluation Criteria <br>Brian Shura | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle"> | + | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">17:00-17:50 |
<td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">OWASP Live CD: An open environment for Web Application Security <br>Matt Tesauro / Brad Causey | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">OWASP Live CD: An open environment for Web Application Security <br>Matt Tesauro / Brad Causey | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Learning by Breaking: A New Project Insecure Web Apps <br>Chuck Willis | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Learning by Breaking: A New Project Insecure Web Apps <br>Chuck Willis | ||
| Line 62: | Line 65: | ||
Josh Abraham | Josh Abraham | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle"> | + | <td height="120" rowspan="2" bgcolor="#666699" width="67" valign="middle">18:00-18:50 |
<td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">The Entrepreneur's Guide to Career Management <br>Lee Kushner | <td height="120" rowspan="2" align="center" bgcolor="#ff0000" width="200" valign="middle" width="200">The Entrepreneur's Guide to Career Management <br>Lee Kushner | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Advanced SSL: The good, the bad, and the ugly <br>Michael Coats | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">Advanced SSL: The good, the bad, and the ugly <br>Michael Coats | ||
| Line 70: | Line 73: | ||
<td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">User input piercing for Cross Site Scripting Attacks <br>Matias Blanco | <td height="60" align="center" bgcolor="#808000" width="200" valign="middle" width="200">User input piercing for Cross Site Scripting Attacks <br>Matias Blanco | ||
<tr valign="bottom"> | <tr valign="bottom"> | ||
| − | <td height="60" bgcolor="#666699" width="67" valign="middle"> | + | <td height="60" bgcolor="#666699" width="67" valign="middle">19:00-???? |
<td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception (TBD) | <td height="60" colspan="4" align="center" bgcolor="#c0c0c0" valign="middle">Reception (TBD) | ||
</font> | </font> | ||
Revision as of 00:12, 20 August 2009
| Day 1 - Nov 12th 2009 | ||||
| OWASP | Tools | SDLC | Web 2.0 | |
| 07:30-09:00 | Registration | |||
| 09:00-09:15 | Welcome and Opening Remarks | |||
| 9:15-10:15 | Keynote: Joe Jarzombek | |||
| 10:15-11:30 | Coffee Break | |||
| 11:00-11:50 | OWASP ESAPI Jeff Williams | Manipulating Web Application Interfaces, a new approach to input validation Felipe Moreno-Strauch | Development Issues Within AJAX Applications: How to Divert Threats Lars Ewe | Understanding the Implications of Cloud Computing on Application Security Dennis Hurst |
| 12:00-12:50 | Software Assurance Maturity Model (SAMM) Pravir Chandra | The Case of Promiscuous Parameters and other Ongoing Capers in Web Security Jacob West | Enterprise Application Security - GE's approach to solving root cause and establishing a Center of Excellence Darren Challey | Transparent Proxy Abuse Robert Auger |
| 13:00-13:50 | Lunch | |||
| 14:00-14:50 | DISA's Application Security and Development STIG: How OWASP Can Help You Jason Li | OWASP ModSecurity Core Rule Set Project Ryan C. Barnett | The essential role of infosec in secure software development Kenneth R. van Wyk | Fracturing Flex For Fun- An Alliterative Attackers Approach Jon Rose/Kevin Stadmeyer |
| 15:00-15:50 | Defend Yourself: Integrating Real Time Defenses into Online Applications Michael Coates | Finding the Hotspots: Web-security testing with the Watcher tool Chris Weber | SDLC Pannel | Social Zombies: Your Friends Want to Eat Your Brains Tom Eston/Kevin Johnson |
| 16:00-16:50 | The ESAPI Web Application Firewall Arshan Dabirsiaghi | One Click Ownage Ferruh Mavituna | Cloudy with a chance of 0-day Jon Rose/Tom Leavey | |
| Web Application Security Scanner Evaluation Criteria Brian Shura | ||||
| 17:00-17:50 | OWASP Live CD: An open environment for Web Application Security Matt Tesauro / Brad Causey | Learning by Breaking: A New Project Insecure Web Apps Chuck Willis | Vulnerability Management in an Application Security World Dan Cornell | Attacking WCF Web Services Brian Holyfield |
| Synergy! - A world where the tools communicate Josh Abraham | ||||
| 18:00-18:50 | The Entrepreneur's Guide to Career Management Lee Kushner | Advanced SSL: The good, the bad, and the ugly Michael Coats | Threat Modeling John Steven | When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies Rafal Los |
| User input piercing for Cross Site Scripting Attacks Matias Blanco | ||||
| 19:00-???? | Reception (TBD) | |||