|
|
| (68 intermediate revisions by 7 users not shown) |
| Line 2: |
Line 2: |
| | | | |
| | Welcome to the local Norway chapter homepage. The chapter leader is [mailto: [email protected] Erlend Oftedal]. | | Welcome to the local Norway chapter homepage. The chapter leader is [mailto: [email protected] Erlend Oftedal]. |
| − | <paypal>Norway</paypal>
| |
| | | | |
| − | Se hvem som sitter i [[Norway Chapter styret]] og les [[Norway Chapter vedtekter]]. OWASP Norway Chapter er [http://w2.brreg.no/enhet/sok/detalj.jsp?orgnr=994253085 registrert i Bønnøysund] med organisasjonsnummer 994 253 085. | + | Se hvem som sitter i [[Norway Chapter styret]] og les [[Norway Chapter vedtekter]]. OWASP Norway Chapter er [http://w2.brreg.no/enhet/sok/detalj.jsp?orgnr=994253085 registrert i Brønnøysund] med organisasjonsnummer 994 253 085. |
| | | | |
| | == Participation == | | == Participation == |
| Line 10: |
Line 9: |
| | OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]]. | | OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]]. |
| | | | |
| − | To join the chapter mailing list, please visit our [https://lists.owasp.org/mailman/listinfo/owasp-norway mailing list] homepage. The list is used to discuss the meetings and to arrange meeting locations. You can also review the [https://lists.owasp.org/pipermail/owasp-norway/ email archives] to see what folks have been talking about. Please check the mailing list before coming to a meeting to confirm the location and time and to catch any last minute notes. | + | To join the chapter mailing list, please visit our [https://groups.google.com/a/owasp.org/forum/#!forum/norway-chapter mailing list] homepage. The list is used to discuss the meetings and to arrange meeting locations. You can also review the old [https://lists.owasp.org/pipermail/owasp-norway/ email archives] to see what folks have been talking about. |
| | | | |
| − | == Medlemsmøter 2011 ==
| + | We also have a slack channel #chapter-norway at https://owasp.slack.com. |
| | | | |
| − | === [[OWASP Norway - Hall of fame ]] === | + | == Medlemsmøter == |
| | | | |
| − | [[Forslagskasse]] for tema | + | Fremtidige medlemsmøter blir annonsert på mailinglista og på [http://www.meetup.com/OWASP-Norway/ meetup.com/OWASP-Norway/]. Påmelding finner du også der. |
| | + | Det er anbefalt at du melder deg på [https://lists.owasp.org/mailman/listinfo/owasp-norway e-postlista] slik at du får med deg oppdateringer og nyheter hos OWASP Norway. |
| | | | |
| − | Hvis du ikke er på [https://lists.owasp.org/mailman/listinfo/owasp-norway e-postlista] så meld deg på! | + | Hvis du har noen tanker eller ideer til tema for medlemsmøter så har vi en [[Forslagskasse]] som du kan poste i. For å se hva vi har snakket om tidligere kan du se i [[#Tidligere år|medlemsmøtehistorikken]]. |
| | | | |
| − | === Neste møte === | + | === Neste møter === |
| | | | |
| − | ==== Medlemsmøte: 19. mars, kl TBA ==== | + | ==== Medlemsmøte 19. november 2019 17:00 - 19:00 ==== |
| − | '''Ansvarlig:''' Erlend Oftedal ,
| |
| − | '''Sponsor:''' F5,
| |
| − | '''Adresse:''' TBA,
| |
| − | '''Påmelding:''' [http://www.doodle.com/d4rfandvnakqydc6 klikk her]
| |
| − | {|
| |
| − | |'''"Web Application Access Control Design Excellence"''', Jim Manico<br>
| |
| | | | |
| − | Access Control is a necessary security control at almost every layer within a web application. This talk will discuss
| + | '''Sted:''' Teknologihuset, Pilestedet 56, Oslo |
| − | several of the key access control anti-patterns commonly found during website security audits. These access control anti-patterns
| |
| − | include hard-coded security policies, lack of horizontal access control, and "fail open" access control mechanisms. In reviewing
| |
| − | these and other access control problems, we will discuss and design a positive access control mechanism that is data contextual,
| |
| − | activity based, configurable, flexible, and deny-by-default - among other positive design attributes that make up a robust
| |
| − | web-based access-control mechanism.
| |
| − | |}
| |
| | | | |
| | + | '''Påmelding:''' https://www.meetup.com/OWASP-Norway/events/266233553/ |
| | | | |
| − | ==== Medlemsmøte: 30. November kl 18:30 - ====
| + | '''Agenda:''' https://www.meetup.com/OWASP-Norway/events/266233553/ |
| − | '''Ansvarlig:''' Erlend Oftedal , | |
| − | '''Sponsor:''' TBA,
| |
| − | '''Adresse:''' Hackeriet at Hausmannsgate 34, Oslo,
| |
| − | '''Påmelding:''' [http://www.meetup.com/hackeriet/events/39973222/ Påmelding via hackeriets side på meetup.com]
| |
| | | | |
| − | '''Agenda:''' Shodan
| |
| | | | |
| − | '''Felles medlemsmøte med [http://www.meetup.com/hackeriet/ Hackeriet]!'''
| |
| − | {|
| |
| − | |'''"Let me Shodan that for you..."''', Eireann Leverett<br>
| |
| − | Workshops are fun. Let's have one.<br>
| |
| − | <p>
| |
| − | Bring your laptop and willingness to write ten simple lines of code in
| |
| − | Perl, Python, or Ruby. Even if you can't code, come by and learn to use
| |
| − | Shodan the computer search engine through the web interface. While the
| |
| − | speaker will share a tiny bit of what he did with this tool, the focus
| |
| − | will be on what you could be using it for...this is a interactive
| |
| − | workshop, not a boring seminar. </p>
| |
| − | <p>
| |
| − | Keywords for interest: banner grabbing, network scanning, application
| |
| − | deployment profiling, security research, geolocation, security
| |
| − | visualisation, network exploration, open source intelligence, fun.
| |
| − | </p>
| |
| − | <p>
| |
| − | Eireann Leverett spent six months working with 'Shodan the computer
| |
| − | search engine'. It's an under-rated tool that was developed by John
| |
| − | Matherly. John has given you a surprisingly big gift, why not learn to use it?
| |
| − | </p>
| |
| − | |}
| |
| | | | |
| | === Tidligere møter === | | === Tidligere møter === |
| | | | |
| − | ==== Medlemsmøte: Torsdag 27. oktober kl 17:00 - 19:00 ==== | + | ==== Medlemsmøte 16. oktober 2019 17:00 - 19:00 ==== |
| − | '''Ansvarlig:''' Erlend Oftedal, tel: 98219335,
| |
| − | '''Sponsor:''' Universitetet i Oslo,
| |
| − | '''Adresse:''' [http://maps.google.com/maps?q=Forskningsveien+3B,+0373+Oslo,+Norway&hl=en&ll=59.944545,10.712292&spn=0.008931,0.033023&sll=37.0625,-95.677068&sspn=57.030354,135.263672&vpsrc=6&hnear=Forskningsveien+3B,+Ris,+0373+Oslo,+Norway&t=m&z=16 Universitetet i Oslo Forskningsveien 3B],
| |
| − | '''Påmelding:''' [http://doodle.com/epsggsvu78q4r46h Påmelding]
| |
| | | | |
| − | '''Agenda:''' | + | '''Sted:''' Miles, Bislettgata 4, Oslo, 6th floor |
| − | {|
| |
| − | |'''17:00-17:15'''
| |
| − | | Next Generation Clickjacking demo - Geir Harald Hansen
| |
| − | |-
| |
| − | |'''17:15-17:45'''
| |
| − | | Erfaringer som pentestere. 2 spennende demoer til slutt om det blir tid. Stikkord: Brute-forcing og Burp Suite - Asbjørn Reglund Thorsen
| |
| − | |-
| |
| − | | '''17:45-18:15'''
| |
| − | | Pause m pizza
| |
| − | |-
| |
| − | |'''18:15-19:00'''
| |
| − | | AppSensor - Jøran Lillesand
| |
| − | Hvordan kan man gjøre applikasjonen selv i stand til å skjønne når den er under angrep? Og hva kan den gjøre med det?
| |
| − | |}
| |
| | | | |
| − | ==== Medlemsmøte: Tirsdag 21. juni kl 17:00 - 19:00 ====
| + | '''Påmelding:''' https://www.meetup.com/OWASP-Norway/events/265374152/ |
| − | '''Ansvarlig:''' Erlend Oftedal, tel: 98219335,
| |
| − | '''Sponsor:''' BEKK, | |
| − | '''Adresse:''' Akershusstranda 21, Vippetangen [http://www.bekk.no/Kontakt/ Kart] ,
| |
| | | | |
| − | Agenda:
| + | '''Agenda:''' https://www.meetup.com/OWASP-Norway/events/265374152/ |
| − | {|
| |
| − | |'''17:00-17:45'''
| |
| − | | Utvalgte tema fra OWASP AppSecEU
| |
| − | |-
| |
| − | | '''17:45-18:15'''
| |
| − | | Pause m pizza
| |
| − | |-
| |
| − | |'''18:15-19:00'''
| |
| − | | "Endpoint security & mobility" - Carsten Maartmann-Moe
| |
| − | "An adversary's physical access to a mobile device often makes existing security controls fail - why? This speaking session will demonstrate creative methods to exploit endpoints - that is, mobile units. It will include hands-on demonstrations of coldboot attacks, hacking through FireWire and how to locate encryption keys in mobile device RAM. Potential countermeasures are outlined, and we'll focus on why end point security is important - and difficult."
| |
| − | |}
| |
| | | | |
| | | | |
| | + | ==== Medlemsmøte 9. april 2019 17:00 - 19:00 ==== |
| | | | |
| | + | '''Sted:''' Teknologihuset, Pilestedet 56, Oslo |
| | | | |
| − | ===== Generalforsamling: Torsdag 12. mai kl 17:00 - 17:15 =====
| + | '''Påmelding:''' https://www.meetup.com/OWASP-Norway/events/259385379/ |
| | | | |
| − | [[Norway/Generalforsamling 2011]]
| + | '''Agenda:''' https://www.meetup.com/OWASP-Norway/events/259385379/ |
| | | | |
| − | Ansvarlig: Kåre Presttun, tel: 4100 4908,
| + | == Lokale nyheter == |
| − | Sponsor: mnemonic as ,
| |
| − | Adresse: Wergelandsveien 25, [http://maps.google.com/maps?q=wergelandsveien+25,+oslo&oe=utf-&um=1&ie=UTF-8 Kart her], og [http://doodle.com/5nz7vu8uvqhsmxwp Meld på her]
| |
| | | | |
| − | Agenda:
| + | == Tidligere år == |
| − | * Godkjenning av innkalling
| |
| − | * [[Årsberetning 2010/2011]]
| |
| − | * Eventuelt
| |
| − | * Valg
| |
| − | | |
| − | ===== Medlemsmøte: Torsdag 12. mai kl 17:15 - 19:15 ===== | |
| − | | |
| − | Ansvarlig: Kåre Presttun, tel: 4100 4908,
| |
| − | Sponsor: mnemonic as ,
| |
| − | Adresse: Wergelandsveien 25
| |
| − | | |
| − | Slides:
| |
| − | [[Media:The_image_that_called_me.pdf]]
| |
| − | [[Media:Locking_the_throneroom.pdf]]
| |
| − | | |
| − | | |
| − | | |
| − | Agenda:
| |
| − | {|
| |
| − | |17.15 - 18.00
| |
| − | |'''The Image that called me - Security impact of Scalable Vector Graphics on the WWW''' - Mario Heiderich
| |
| − | | |
| − | Scalable Vector Graphics are about to conquer the web. Unlike most of their raster based companions from the GIF, PNG and JPEG
| |
| − | family, their vector based structure allows to display them on many different devices with various screen sizes without losing
| |
| − | visual information. The open XML based SVG sources permit addition of meta data, helping even the visually impaired and blind
| |
| − | to get the most out of these images. Additional modules, such as animations, events, SVG fonts, several scripting APIs and
| |
| − | inclusion of hyper-links, other images and documents and even arbitrary content from cross-domain sources make SVG the perfect
| |
| − | image format for the future WWW.
| |
| − | | |
| − | Nevertheless, a powerful standard such as SVG certainly poses a lot of risks. This presentation provides a close look at SVG
| |
| − | from a security perspective. How can attackers abuse this mighty image format, which ways exist to execute script code and
| |
| − | worse, and what should web developers and browser vendors consider when dealing with SVG. How will HTML5 change the way to
| |
| − | work with SVGs and why does it matter for security professionals to know about things like SVG Tiny, in-line SVG, SVGz and
| |
| − | other acronyms from a world where imaging and scripting collide? Besides many examples of malicious SVGs the talk will shed
| |
| − | light on a novel filtering tool capable of filtering and sanitizing SVG images without loss of important content.
| |
| − | |-
| |
| − | |18.00 - 18.30
| |
| − | | Mat
| |
| − | |-
| |
| − | |18.30 - 19.15
| |
| − | |'''Locking the Throne Room - ECMA Script 5, a frozen DOM and the eradication of XSS''' - Mario Heiderich
| |
| − | | |
| − | Cross Site Scripting has been a topic in countless presentations over the last decade. That easy to grasp but hard to solve
| |
| − | problem has been shaking the web and caused major trouble on hundreds to thousands of high traffic and commercial and well as
| |
| − | governmental websites. Mitigation techniques have been developed and discussed in depth - starting with restrictive content
| |
| − | filters, educational programs and trainings, programmer's best practices and guidelines, proxy filters and many more. Still
| |
| − | XSS remains a major problem far from being solved. The multilayer model on which the web relies causes too much reciprocity to
| |
| − | find an easy cure - and the DOM as the actually affected layer is still lying unprotected open for the attacker.
| |
| − | | |
| − | This presentation introduces and discusses a novel approach of encountering XSS and similar attack techniques by making use of
| |
| − | several new features included in the ECMA Script 5 specification draft. It will be shown how to create a simple JavaScript to
| |
| − | seal important DOM properties, and take away the attackers ability to read and modify sensitive data in a tamper resistant and
| |
| − | light-weighted way - without being "too loud". Modern browsers, such as Chrome 8 and Firefox 4, for the first time provide the
| |
| − | possibility of creating and using client side IDS/IPS systems, written in JavaScript and running without special execution
| |
| − | privileges. The presentation will show how these work, what the implications are, and what the future of XSS mitigation and
| |
| − | eradication might look like.
| |
| − | |}
| |
| − | '''Speaker:'''
| |
| − | '''Mario Heiderich''' works as a researcher for the Ruhr-University in Bochum, Germany as well as Microsoft, Redmond and currently
| |
| − | focuses on HTML5, SVG security and security implications of the ES5 specification draft while finishing his PhD thesis. Mario
| |
| − | invoked the HTML5 security cheat-sheet and maintains the PHPIDS filter rules. In his spare time he delivers trainings and
| |
| − | security consultancy for larger German and international companies. He is also one of the co-authors of Web Application
| |
| − | Obfuscation: '-/WAFs..Evasion..Filters/
| |
| − | | |
| − | ===== Medlemsmøte tirsdag 22. mars kl 16:00 --> =====
| |
| − | | |
| − | Ansvarlig: Kåre Presttun,<br>
| |
| − | Sponsor: [https://wiki.cantara.no/display/PE/Communities+in+action+2011 Communities in Action 2011],<br>
| |
| − | Adresse: Radisson Blu Hotel, Holbergsgt. 30, [http://www.radissonblu.no/scandinaviahotell-oslo/beliggenhet Kart her], og [http://doodle.com/h53d9i9m8iuh2mib Meld på her]
| |
| − | | |
| − | Dette møtet er i samarbeid med Communities in Action 2011. OWASP Norway Chapter deltar sammen med javaBin, Kode kata, XP meetup, Framsia, Makers, Cocoaheads, NNUG og Oslo Lean Meetup. Dette er en spennende anledning til å mingle med andre "communities".
| |
| − | | |
| − | Program:
| |
| − | | |
| − | - 16:00 - 17:30 Enkel bevertning<br>
| |
| − | - 17:30 - 19:30 Parallellsesjoner<br>
| |
| − | - 20:00 - 21:00 Paneldebatt<br>
| |
| − | - 21:00 --> Mingling i Skybar<br>
| |
| | | | |
| − | [https://wiki.cantara.no/display/PE/Program+CiA+2011 Detaljert program for CiA 2011 her]
| + | === [[Medlemsmøter 2018]] === |
| − | | |
| − | == Lokale Nyheter == | |
| − | | |
| − | | |
| − | == Tidligere år == | |
| | | | |
| | + | === [[Medlemsmøter 2017]] === |
| | + | === [[Medlemsmøter 2016]] === |
| | + | === [[Medlemsmøter 2015]] === |
| | + | === [[Medlemsmøter 2014]] === |
| | + | === [[Medlemsmøter 2013]] === |
| | + | === [[Medlemsmøter 2012]] === |
| | === [[Medlemsmøter 2011]] === | | === [[Medlemsmøter 2011]] === |
| | === [[Medlemsmøter 2010]] === | | === [[Medlemsmøter 2010]] === |
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the Chapter Rules.