This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "LatamTour2012 BA Agenda"
From OWASP
(35 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | <noinclude>{{:LatamTour2012 header}}</noinclude> | ||
+ | |||
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" | {|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" | ||
|- | |- | ||
Line 25: | Line 27: | ||
|} | |} | ||
<br> | <br> | ||
− | {|style="vertical-align:top;width: | + | {|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5" |
|- | |- | ||
− | | style="width: | + | | style="width:90%" valign="middle" height="40" bgcolor="#CCCCEE" align="center" colspan="6" | '''DETALLES DE LA JORNADA''' |
|- | |- | ||
| style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Horario''' | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Horario''' | ||
| style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Modulo''' | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Modulo''' | ||
| style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Ponente''' | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Ponente''' | ||
− | | style="width: | + | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Detalles''' |
− | | style="width: | + | |- |
− | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 09:00 - 09:15 | |
− | + | | style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Inició y presentación del evento | |
+ | | style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli, Pablo Romanos | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 09:15 - 10:00 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Post Explotation: PHP Backdoor Introduction | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Claudio Caracciolo | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CCaracciolo_PHPBackdoor.pdf]] | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 10:00 - 10:45 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Consecuencias de un Administrador "perezoso" | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Cristian Borghello | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:CBorghello_ConsecuenciasdeunAdmin.pdf]] | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 10:45 - 11:15 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:15 - 11:45 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Datos Personales en el Ciclo de Vida de Desarrollo Seguro | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Pablo Romanos | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:PRomanos_DatosPersonales.pdf]] | ||
+ | |- | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 11:45 - 12:15 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | HTExploit - Bypassing htaccess and beyond | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Maximiliano Soler, Matias Katz | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:MSoler_MKatz_HTExploit.pdf]] | ||
+ | |- | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 12:15 - 12:45 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Intro a HTML5 | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Andres Riancho | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:OWASP_Latam_2012_-_HTML5_-_Andres_Riancho.pdf]] | ||
+ | |- | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 12:45 - 14:00 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Almuerzo | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
+ | |- | ||
+ | |- | ||
+ | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:00 - 14:45 | ||
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Tu sitio web: un arma para el cibercrimen | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Sebastian Bortnik | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD | ||
+ | |- | ||
+ | |- | ||
|- | |- | ||
− | | align="center" height="30" style=" | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 14:45 - 15:30 |
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Modelado de Amenazas: Una Introducción | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | [[File:HRacciatti_ModeladodeAmenazas.pdf]] | ||
|- | |- | ||
− | |||
|- | |- | ||
− | | valign="center" bgcolor="# | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 15:30 - 16:15 |
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Desarrollo seguro con herramientas y procesos OWASP | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Fabio Cerullo | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD | ||
|- | |- | ||
− | |||
|- | |- | ||
− | | style="width: | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | 16:15 - 16:45 |
− | | style="width: | + | | style="width:27%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | Break |
+ | | style="width:23%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | | ||
|- | |- | ||
− | |||
− | |||
|- | |- | ||
− | | align="center" style=" | + | | style="width:10%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | 16:45 - 17:45 |
+ | | style="width:27%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Panel de Hacktivismo | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#EEEEEE" align="center" colspan="0" | TBD | ||
|- | |- | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
− | | style="width: | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 17:45 - 18:00 |
+ | | style="width:27%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Entrega de premios y cierre del evento | ||
+ | | style="width:23%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Martín Tartarelli | ||
+ | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | | ||
|- | |- | ||
− | | | + | |} |
− | |||
− | |||
− | |||
− |
Latest revision as of 01:10, 5 June 2012
CURSO | |
OWASP Latam Tour Argentina 2012 | |
Descripcion y Objetivo | |
| |
Fecha | Lugar |
14 de Mayo de 2012 | Aula Magna - Universidad de la Marina Mercante (UdeMM) ubicado en Av. Rivadavia 2258, Ciudad Autónoma de Buenos Aires, Capital Federal, Argentina. |
Precio y Registracion | |
GRATIS - Registrate AQUI |
DETALLES DE LA JORNADA | |||||
Horario | Modulo | Ponente | Detalles | ||
09:00 - 09:15 | Inició y presentación del evento | Martín Tartarelli, Pablo Romanos | |||
09:15 - 10:00 | Post Explotation: PHP Backdoor Introduction | Claudio Caracciolo | File:CCaracciolo PHPBackdoor.pdf | ||
10:00 - 10:45 | Consecuencias de un Administrador "perezoso" | Cristian Borghello | File:CBorghello ConsecuenciasdeunAdmin.pdf | ||
10:45 - 11:15 | Break | ||||
11:15 - 11:45 | Datos Personales en el Ciclo de Vida de Desarrollo Seguro | Pablo Romanos | File:PRomanos DatosPersonales.pdf | ||
11:45 - 12:15 | HTExploit - Bypassing htaccess and beyond | Maximiliano Soler, Matias Katz | File:MSoler MKatz HTExploit.pdf | ||
12:15 - 12:45 | Intro a HTML5 | Andres Riancho | File:OWASP Latam 2012 - HTML5 - Andres Riancho.pdf | ||
12:45 - 14:00 | Almuerzo | ||||
14:00 - 14:45 | Tu sitio web: un arma para el cibercrimen | Sebastian Bortnik | TBD | ||
14:45 - 15:30 | Modelado de Amenazas: Una Introducción | Hernan Racciatti | File:HRacciatti ModeladodeAmenazas.pdf | ||
15:30 - 16:15 | Desarrollo seguro con herramientas y procesos OWASP | Fabio Cerullo | TBD | ||
16:15 - 16:45 | Break | ||||
16:45 - 17:45 | Panel de Hacktivismo | Hernan Racciatti, Ricardo Saenz, Daniel Monastersky, Mariano del Rio | TBD | ||
17:45 - 18:00 | Entrega de premios y cierre del evento | Martín Tartarelli |