This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "LatamTour2012 BA Agenda"
From OWASP
| (38 intermediate revisions by 3 users not shown) | |||
| Line 1: | Line 1: | ||
| + | <noinclude>{{:LatamTour2012 header}}</noinclude> | ||
| + | |||
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" | {|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" | ||
|- | |- | ||
| Line 21: | Line 23: | ||
| align="center" style="background:#CCCCEE;" colspan="2" | '''Precio y Registracion''' | | align="center" style="background:#CCCCEE;" colspan="2" | '''Precio y Registracion''' | ||
|- | |- | ||
| − | | align="center" style="background:#CCCCEE;" colspan="2" | | + | | align="center" style="background:#CCCCEE;" colspan="2" | GRATIS - [https://www.regonline.com/latamtourarg2012 Registrate AQUI] |
| − | GRATIS | + | |
| − | |||
| − | |||
| − | |||
|} | |} | ||
<br> | <br> | ||
| − | {|style="vertical-align:top;width: | + | {|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" |
|- | |- | ||
| − | | style="width: | + | | style="width:90%" valign="middle" height="40" bgcolor="#CCCCEE" align="center" colspan="6" | '''DETALLES DE LA JORNADA''' |
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Horario''' | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Horario''' | ||
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Modulo''' | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Modulo''' | ||
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Ponente''' | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Ponente''' | ||
| − | | style="width: | + | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Detalles''' |
| − | | style="width: | + | |- |
| − | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 09:00 - 09:15 | |
| − | | | + | | style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Inició y presentación del evento |
| − | + | | style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli, Pablo Romanos | |
| − | + | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | |
| − | + | |- | |
| − | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00 | |
| − | + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Post Explotation: PHP Backdoor Introduction | |
| − | + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Claudio Caracciolo | |
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CCaracciolo_PHPBackdoor.pdf]] | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Consecuencias de un Administrador "perezoso" | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Cristian Borghello | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CBorghello_ConsecuenciasdeunAdmin.pdf]] | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Datos Personales en el Ciclo de Vida de Desarrollo Seguro | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pablo Romanos | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:PRomanos_DatosPersonales.pdf]] | ||
| + | |- | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | HTExploit - Bypassing htaccess and beyond | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Maximiliano Soler, Matias Katz | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:MSoler_MKatz_HTExploit.pdf]] | ||
| + | |- | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Intro a HTML5 | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andres Riancho | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:OWASP_Latam_2012_-_HTML5_-_Andres_Riancho.pdf]] | ||
| + | |- | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 12:45 - 14:00 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Almuerzo | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
| + | |- | ||
| + | |- | ||
| + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:00 - 14:45 | ||
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Tu sitio web: un arma para el cibercrimen | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sebastian Bortnik | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD | ||
| + | |- | ||
| + | |- | ||
|- | |- | ||
| − | | align="center" height="30" style=" | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30 |
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Modelado de Amenazas: Una Introducción | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:HRacciatti_ModeladodeAmenazas.pdf]] | ||
|- | |- | ||
| − | |||
|- | |- | ||
| − | | valign="center" bgcolor="# | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:15 |
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Desarrollo seguro con herramientas y procesos OWASP | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Fabio Cerullo | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD | ||
|- | |- | ||
| − | |||
|- | |- | ||
| − | | style="width: | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 16:15 - 16:45 |
| − | | style="width: | + | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break |
| + | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
|- | |- | ||
| − | |||
| − | |||
|- | |- | ||
| − | | align="center" style=" | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:45 |
| + | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Panel de Hacktivismo | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD | ||
|- | |- | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
|- | |- | ||
| − | | style="width: | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 17:45 - 18:00 |
| + | | style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Entrega de premios y cierre del evento | ||
| + | | style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli | ||
| + | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | ||
|- | |- | ||
| − | | | + | |} |
| − | |||
| − | |||
| − | |||
| − | |||
Latest revision as of 01:10, 5 June 2012
| CURSO | |
| OWASP Latam Tour Argentina 2012 | |
| Descripcion y Objetivo | |
| |
| Fecha | Lugar |
| 14 de Mayo de 2012 | Aula Magna - Universidad de la Marina Mercante (UdeMM) ubicado en Av. Rivadavia 2258, Ciudad Autónoma de Buenos Aires, Capital Federal, Argentina. |
| Precio y Registracion | |
| GRATIS - Registrate AQUI | |
| DETALLES DE LA JORNADA | |||||
| Horario | Modulo | Ponente | Detalles | ||
| 09:00 - 09:15 | Inició y presentación del evento | Martín Tartarelli, Pablo Romanos | |||
| 09:15 - 10:00 | Post Explotation: PHP Backdoor Introduction | Claudio Caracciolo | File:CCaracciolo PHPBackdoor.pdf | ||
| 10:00 - 10:45 | Consecuencias de un Administrador "perezoso" | Cristian Borghello | File:CBorghello ConsecuenciasdeunAdmin.pdf | ||
| 10:45 - 11:15 | Break | ||||
| 11:15 - 11:45 | Datos Personales en el Ciclo de Vida de Desarrollo Seguro | Pablo Romanos | File:PRomanos DatosPersonales.pdf | ||
| 11:45 - 12:15 | HTExploit - Bypassing htaccess and beyond | Maximiliano Soler, Matias Katz | File:MSoler MKatz HTExploit.pdf | ||
| 12:15 - 12:45 | Intro a HTML5 | Andres Riancho | File:OWASP Latam 2012 - HTML5 - Andres Riancho.pdf | ||
| 12:45 - 14:00 | Almuerzo | ||||
| 14:00 - 14:45 | Tu sitio web: un arma para el cibercrimen | Sebastian Bortnik | TBD | ||
| 14:45 - 15:30 | Modelado de Amenazas: Una Introducción | Hernan Racciatti | File:HRacciatti ModeladodeAmenazas.pdf | ||
| 15:30 - 16:15 | Desarrollo seguro con herramientas y procesos OWASP | Fabio Cerullo | TBD | ||
| 16:15 - 16:45 | Break | ||||
| 16:45 - 17:45 | Panel de Hacktivismo | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio | TBD | ||
| 17:45 - 18:00 | Entrega de premios y cierre del evento | Martín Tartarelli | |||
