This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecResearch2012"

From OWASP
Jump to: navigation, search
(2012, external site)
 
(3 intermediate revisions by 2 users not shown)
Line 16: Line 16:
  
  
[http://www.appsecresearch.org AppSec Research Conference Website]
+
[http://2012.appsec.eu AppSec Research 2012 Conference Website]
  
  
Line 30: Line 30:
  
  
Sponsorship Information can be downloaded [ftp://appseceu2012@appsecresearch.org/wp-content/uploads/OWASP_AppSec_Research_2012_sponsorship_packages.pdf here] also you can find it online [http://www.appsecresearch.org/?page_id=17 here]
+
Sponsorship Information can be downloaded [ftp://appseceu2012@appsecresearch.org/wp-content/uploads/OWASP_AppSec_Research_2012_sponsorship_packages.pdf here] also you can find it online [http://2012.appsec.eu/?page_id=17 here]
  
  
Line 106: Line 106:
  
  
[http://www.appsecresearch.org/wp-content/uploads/2012/02/OWASP_AppSec_Research2012_CFP.pdf Download Call for Papers in PDF format]
+
[http://2012.appsec.eu/wp-content/uploads/2012/02/OWASP_AppSec_Research2012_CFP.pdf Download Call for Papers in PDF format]
  
 
<h4 style="text-align: center;"><strong>OWASP AppSec Research 2012</strong>
 
<h4 style="text-align: center;"><strong>OWASP AppSec Research 2012</strong>
Line 182: Line 182:
 
John Wilander, OWASP, Sweden
 
John Wilander, OWASP, Sweden
  
 +
=Training=
 +
 +
Training
 +
 +
The OWASP Appsec Research 2012 conference is offering world class application security training courses for a variety of skill levels and interests. This year the available training modules address hot topics like mobile security and at the same time cover every aspect of software security: building, breaking and defending.
 +
 +
Time schedule for training sessions will be:
 +
 +
9:30 – 11:00: First Session
 +
11:00 – 11:30: Coffee Break
 +
11:30 – 13:00: Second Session
 +
13:00 – 14:00: Lunch Break
 +
14:00 – 15:30: Third Session
 +
15:30 – 16:00: Coffee Break
 +
16:00 – 17:30: Fourth Session
 +
 +
Room allocation:
 +
 +
Elite Web Defense – How to build robust and secure web applications: B
 +
Assessing and Exploiting Web Applications with Samurai-WTF: C
 +
Hack Your Own Code: Advanced training for developers: E
 +
Mobile Security: Securing Your Small, Smart Devices: ST
 +
 +
 +
 +
Mobile Security: Securing Your Small, Smart Devices
 +
 +
Trainer: David Wichers (Aspect Security)
 +
Audience Background: Technical
 +
Audience Skill: Intermediate
 +
Duration: 2 days – July 10-11, 2012
 +
 +
Training Summary:
 +
 +
Smart phones and tablets are everywhere these days. These small, smart devices provide as much functionality as a desktop or laptop. Chances of misplacing or losing these mobile devices are high. The risks of breaching an organization’s and/or user’s data are probable. Securing the applications and connectivity is crucial.
 +
 +
Because we believe that the best way to learn is by doing, much of the course’s content will be delivered in a lab
 +
environment. This approach enables students to have hands-on experience with attack tools and flawed applications so
 +
that they can learn how to identify vulnerabilities using real-world scenarios.
 +
 +
 +
 +
Attendee takeaways and key learning objectives:
 +
 +
Understand how mobile devices and applications can be easily attacked.
 +
Identify common vulnerabilities.
 +
Be able to use state-of-the-art mobile application security testing tools.
 +
Secure mobile devices across the enterprise.
 +
Think like an attacker so that students can be pre-emptive.
 +
Trainer Bio:
 +
 +
Dave Wichers is the Chief Operating Officer (COO) of Aspect Security (www.aspectsecurity.com), a company that specializes in application security services. Mr. Wichers brings over seventeen years of experience in the information security field. Prior to Aspect, he ran the Application Security Services Group at a large data center company, Exodus Communications.
 +
 +
His current work involves helping customers, from small e-commerce sites to Fortune 500 corporations and the U.S. Government, secure their applications by providing application security design, architecture, and SDLC support services: including code review, application penetration testing, security policy development, security consulting services, and
 +
developer training.
 +
 +
Dave holds a BSE in Computer Systems Engineering from Arizona State University and a Masters degree in Computer Science from the University of California at Davis. Dave is a CISSP and a CISM, is currently the OWASP Conferences Chair (www.owasp.org), and is a coauthor of the OWASP Top Ten.
 +
 +
Training Outline
 +
 +
1)  Mobile Application Threat Model
 +
Section Overview: An explanation of high-level threats, attack techniques and the impacts associated with mobile computing.
 +
 +
1) Introductions
 +
2) What is a mobile device?
 +
3)      Architectures
 +
4)      Threat Model
 +
5)      Malware
 +
6)      App Store Reality Check
 +
 +
2)  Mobile Application Architecture
 +
 +
Section Overview: Different styles of computing in the mobile space, the core technologies involved, and how applications are built.
 +
 +
1)      Security technologies in the platform
 +
2)      Architecture Controls
 +
 +
3)  Securing the Device
 +
 +
Section Overview: We demonstrate how to harden mobile devices against attack and the issues related to managing security across an enterprise.  We show students how to secure employee-owned devices
 +
 +
1)      Mobile Device Management Applications
 +
 +
4)  Securing Communications
 +
Section Overview: What are all the different communications technologies used by mobile devices and what security threats do they pose?
 +
 +
1)      Threat: Unsafe wireless access points, sniffing, tampering
 +
 +
2)      Review mobile protocols and platforms
 +
3)      Selecting data transfer protocols
 +
 +
5)    Mobile Authentication
 +
 +
Section Overview: We explain how the user proves their identity to the phone, how server-side applications can authenticate the user, and how the phone can authenticate the services used.
 +
 +
1)      Threats: lost/stolen phone, remember me, sniffing
 +
2)      Communicating credentials safely
 +
3)      Storing credentials safely
 +
4)      Handling sessions safely
 +
 +
6)  Mobile Registration
 +
 +
Section Overview: How to register a device to a person and explain the need for mobile channel authentication.
 +
 +
1)      Threats: lost/stolen device, remember me, lost/stolen credentials
 +
2)      Secondary method of authenticating the device
 +
 +
7)  Mobile Data Protection
 +
 +
Section Overview: All of the different places that sensitive data can be stored on phones, and how it can be protected.
 +
 +
1)      Where and how is data stored on devices
 +
2)      Hashing and encryption
 +
3)      Storing keys
 +
4)      HTML5 local storage
 +
 +
8)  Mobile Access Control
 +
 +
Section Overview: The code-access security models in use in mobile devices, jailbreaking, etc.
 +
 +
1)      Threat: app attacks phone, user attacks server
 +
2)      Sandbox and Security Manager, using Permissions
 +
3)      One client to support multiple roles
 +
4)      Managing entitlements on the server
 +
5)      Jailbreaking/rooting
 +
 +
9)  How to Protect Against Cross Site Scripting
 +
 +
Section Overview: The threat of XSS in mobile applications is real based on heavy usage of webkit.
 +
 +
1)      Understand XSS
 +
2)      Learn how to execute XSS
 +
3)      Identify XSS flaws in code
 +
4)      XSS Real world examples
 +
 +
10) Protecting A User’s Privacy
 +
 +
Section Overview: How the phone can be used to undermine user privacy without their knowledge
 +
 +
1)      Using location services (GPS, cell triangulation, compass, hardware device key)
 +
2)      Accessing contacts, photos, maps, and other personal data
 +
3)      Accessing calls, SMS, browser, cell usage history
 +
4)      Using camera, microphone safely
 +
 +
11) Enhancing Legal Agreements
 +
 +
Section Overview: Device functionality can circumvent application security
 +
 +
1)      Bookshelf
 +
2)      Screen shots
 +
3)      Secure storage mechanisms
 +
 +
12) Secure Mobile Development Process
 +
 +
Section Overview: We explain how the app store process works for developers and how they can
 +
ensure that their application doesn’t have security holes.
 +
 +
1)      Optimizing the acceptance process
 +
2)      Using In-App Purchase features safely
 +
3)      Using static analysis tools
 +
4)      Testing with multiple devices at multiple OS levels
 +
5)      Keeping up with jailbreak and root technologies
 +
 +
13) Responding to Vulnerabilities
 +
Section Overview: What to do if your application gets hacked.
 +
 +
1)      Create security@yourdomain.com
 +
2)      Publish security information
 +
3)      Acknowledge incidents and vulnerabilities
 +
4)      Engage with researchers immediately
 +
 +
14) Hack It and Bring It!
 +
Section Overview: A hands-on challenge for students to demonstrate what they have learned.
 +
 +
15) Wrap Up, Close and Thank You
 +
 +
 +
 +
 +
 +
Requirements
 +
 +
Windows laptop capable of running VMWare player or a Mac laptop with  xcode for iOS labs
 +
If students want to run Android labs on Mac, they will need VMWare  fusion, but that is not required.
 +
 +
 +
 +
Building a Software Security Program On Open Source Tools
 +
 +
Trainer:Dan Cornell (Denim Group)
 +
Duration: 2 days
 +
 +
Using the Software Assurance Maturity Model (OpenSAMM) as a framework, this course walks through the major components of a comprehensive software security program and highlights open source and other freely-available tools that can be used to help implement the activities involved in such a program. The focus of the course is on providing hands-on demonstrations of the tools with an emphasis on integrating tool results into the overall software security program. Featured tools include: ESAPI, Microsoft Web Protection Library, FindBugs, FxCop, CAT.NET, Brakeman, Agnitio, Arachini, w3af, ZAProxy, ThreadFix as well as other educational resources from OWASP. Attendees should finish the course with a solid understanding of the various components of acomprehensive software security program as well as hands-on experience with a variety of freely-available tools that they can use to implement portions of these programs.
 +
 +
Outline:
 +
 +
·    So You Want To Roll Out A Software Security Program?
 +
 +
·    The Software Assurance Maturity Model (OpenSAMM)
 +
 +
·    ThreadFix: Overview
 +
 +
·    Governance: Strategy and Metrics
 +
 +
 +
 +
o  ThreadFix: Reporting
 +
 +
·    Governance: Policy and Compliance
 +
 +
·    Governance: Education and Guidance
 +
 +
o  OWASP Development Guide
 +
 +
o  OWASP Cheat Sheets
 +
 +
o  OWASP Secure Coding Practices
 +
 +
·    Construction: Threat Assessment
 +
 +
·    Construction: Security Requirements
 +
 +
·    Construction: Secure Architecture
 +
 +
o  ESAPI overview
 +
 +
o  Microsoft Web Protection Library (Anti-XSS) overview
 +
 +
·    Verification: Design Review
 +
 +
o  Microsoft Threat Analysis and Modeling Tool
 +
 +
·    Verification: Code Review
 +
 +
o  FindBugs
 +
 +
o  FxCop
 +
 +
o  CAT.NET
 +
 +
o  Brakeman
 +
 +
o  Agnitio
 +
 +
·    Verification: Security Testing
 +
 +
o  Arachni
 +
 +
o  w3af
 +
 +
o  ZAProxy
 +
 +
·    Deployment: Vulnerability Management
 +
 +
o  ThreadFix: Defect Tracker Integration
 +
 +
·    Deployment: Environment Hardening
 +
 +
o  Microsoft Baseline Security Analyzer (MBSA)
 +
 +
·    Deployment: Operational Enablement
 +
 +
o  mod_security
 +
 +
 +
 +
Assessing and Exploiting Web Applications with Samurai-WTF
 +
 +
Trainer: Justin Searle (Meeas Security)
 +
Audience Background: Technical
 +
Skill Level: Basic/Intermediate
 +
Duration: 2 Days
 +
 +
Pdf version:here
 +
 +
Training Summary:
 +
Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn the latest Samurai-WTF open source tools and as well as the latest techniques to perform web application penetration tests. After a quick overview of pen testing methodology, the instructors will lead you through the penetration and exploitation of various web applications, including client side attacks using flaws within the application. Different sets of open source tools will be used on each web application, allowing you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a capture the flag event. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence and knowledge necessary to perform web application assessments and expose you to the wealth of freely available, open source tools.
 +
 +
Attendee takeaways and key learning objectives:
 +
 +
1. Attendees will be able to explain the steps and methodology used in performing web application assessments and penetration tests.
 +
2. Attendees will be able to use the open source tools on the Samurai-WTF CD to discover and identify vulnerabilities in web applications.
 +
3. Attendees will be able to exploit several client-side and server-side vulnerabilities.
 +
 +
Trainer Bio:
 +
Justin Searle is a Senior Security Analyst with InGuardians, specializing in the penetration testing of web applications, networks, and embedded devices, especially those pertaining to the Smart Grid. Justin is an active member of ASAP-SG (Advanced Security Acceleration Project for the Smart Grid) and led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628. Previously, Justin served as JetBlue Airway’s IT Security Architect, and has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities and corporations. Justin has presented at top security conferences including DEFCON, ToorCon, ShmooCon, and SANS. Justin co-leads prominent open source projects including the Samurai Web Testing Framework, Middler, Yokoso!, and Laudnum. Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).
 +
 +
Outline
 +
 +
Samurai-WTF Project and Distribution
 +
 +
  About the Project
 +
Using the Live-DVD
 +
Joining the Project
 +
Web Application Assessment Methodology
 +
Pentest Types and Methods
 +
Formal Four Step Methodology
 +
Overview of Web Applications Security Vulnerabilities
 +
Reconnaissance Tools
 +
 +
Overview of Web Application Recon
 +
Domain and IP Registration Databases (Labs: whois)
 +
Google Hacking (Labs: gooscan, gpscan)
 +
Social Networks (Labs: Reconnoiter)
 +
DNS Interrogation (Labs: host, dig, nslookup, fierce)
 +
Mapping Tools
 +
 +
Overview of Mapping
 +
Port Scanning and Fingerprinting (Labs: nmap, zenmap, Yokoso!)
 +
Web Service Scanning (Labs: Nikto)
 +
Spidering (Labs: wget, curl, Paros, WebScarab, BurpSuite)
 +
Discovering “Non-Discoverable” URLs (Labs: DirBuster)
 +
Discovery Tools
 +
 +
  Using Built-in Tools (Labs: Page Info, Error Console, DOM Inspector, View Source)
 +
Poking and Prodding (Labs: Default User Agent, Cookie Editor, Tamper Data)
 +
Interception Proxies (Labs: Paros, WebScarab, BurpSuite)
 +
Semi-Automated Discovery (Labs: RatProxy)
 +
Automated Discovery (Labs: Grendel-Scan, w3af)
 +
Information Discovery (Labs: CeWL)
 +
Fuzzing (Labs: JBroFuzz, BurpIntruder)
 +
Finding XSS (Labs: TamperData, XSS-Me, BurpIntruder)
 +
Finding SQL Injection (Labs: SQL Inject-Me, SQL Injection, BurpIntruder)
 +
Decompiling Flash Objects (Labs: Flare)
 +
Exploitation Tools
 +
 +
  Username Harvesting (Labs: python)
 +
Brute Forcing Passwords (Labs: python)
 +
Command Injection (Labs: w3af)
 +
Exploiting SQL Injection (Labs: SQLMap, SQLNinja, Laudanum)
 +
Exploiting XSS (Labs: Durzosploit)
 +
Browser Exploitation (Labs: BeEF, BrowserRider, Yokoso!)
 +
Advanced exploitation through tool integration (MSF + sqlninja/sqlmap/BeEF)
 +
 +
 +
 +
Hack Your Own Code: Advanced training for developers
 +
 +
 +
 +
Trainer:David Byrne, Charles Henderson (Trustwave)
 +
Audience Background: Technical, Programmers
 +
Skill Level: Intermediate, Advanced, Programmers
 +
Duration: 2 days – July 10-11, 2012
 +
 +
Training Summary:
 +
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability has exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.
 +
 +
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.
 +
 +
Attendee takeaways and key learning objectives:
 +
 +
How to prevent common vulnerabilities with secure development practices.
 +
How vulnerabilities can be exploited in the real world.
 +
How vulnerabilities can be located and patched in existing code.
 +
Trainer Bio:
 +
 +
David Byrne has worked in information security for over a decade. Currently, he is a managing consultant in Trustwave’s Application Security group. Before Trustwave, David was the Security Architect at Dish Network, one of the world’s largest satellite television companies. In 2006, he started the Denver chapter of OWASP. In 2008, David released Grendel (grendel-scan.com), an open source web application security scanner. David has presented at a number of security events including OWASP AppSec USA, OWASP Research Europe, DEFCON, Black Hat, Toorcon, FROC, the SANS penetration testing summit, and the Computer Security Institute’s annual conference.
 +
 +
Charles Henderson is the Director of Application Security Services of SpiderLabs at Trustwave. Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.
 +
 +
 +
 +
Outline:
 +
 +
Introductions
 +
Agenda
 +
Secure Development Lifecycle (SDLC)
 +
A cradle to grave development life cycle is outlined. Threat modeling is introduced as a means of ensuring that software design can meet policy needs.
 +
 +
Lab: Threat Modeling
 +
Different application scenarios will be described and the class will verbally work through modeling threats to them. The primary goal is to get developers to think like an attacker, allowing them to anticipate threats to their own applications.
 +
 +
Principles of Secure Code
 +
Focusing on code quality concepts, the practices that help to quantify secure coding are explored. Practical goals and approaches are reviewed, so that a consistent understanding of “secure” can be encouraged and measured appropriately.
 +
 +
Authentication & Authorization
 +
The different aspects of authentication and authorization are covered. Pitfalls and common attacks against identity management are explored. Mistakes covered include insecure direct object references, failure to restrict URL access, and various types of other authentication and authorization bypass.
 +
 +
Lab: Access Control
 +
Students will learn to attack several web pages that contain a variety of access control vulnerabilities, including Insecure Direct Object Access and Failure to Restrict URL Access. After the vulnerabilities have been exploited, the source code will be reviewed by the students to pinpoint where the flaw was introduced. Strategies will be discussed for preventing this type of flaw.
 +
 +
 +
 +
Mini-Lab: Weak Session Identifiers
 +
A variety of weak and some strong session identifiers will be provided to students, along with tools for gauging their strength.
 +
 +
 +
 +
Session Management
 +
Due to the stateless nature of the web, the security implications of session generation and management are discussed. This includes both client-side token tracking and server-side session handling.
 +
 +
Lab: SQL Injection
 +
Students will finish a simple web page that generates a report based on user-supplied input. Student code (and vulnerable code provided by the instructor) will be deployed on the class web server and tested for SQL Injection vulnerabilities. Students will be shown how SQL Injection can be exploited to extract data and execute arbitrary system commands.
 +
 +
After the attacks are complete, vulnerable source code will be reviewed as a group to spot where the vulnerability was introduced.
 +
 +
Lab: Cross-Site Scripting
 +
Students will finish two simple web pages that store user-supplied input for comments on a blog. Student code (and vulnerable code provided by the instructor) will be deployed on the class web server and tested for Cross-Site Scripting vulnerabilities. Students will be shown how Cross-Site Scripting can be exploited to control a victim user’s browser and supply arbitrary content on the website.
 +
 +
After the attacks are complete, vulnerable source code will be reviewed as a group to spot where the vulnerability was introduced.
 +
 +
Input Validation
 +
The heart of securing software is dealing with user-controlled data to ensure that it doesn’t violate the integrity of a computer system. Improper input validation can allow for vulnerabilities like Cross-Site Scripting and SQL Injection, which are covered extensively. Where relevant, buffer overflow attacks will be covered. Less common input validation vulnerabilities such as XML Injection, XML Entity Expansion, XPATH Injection, and LDAP Injection are also discussed. The advantages of white-listing over blacklisting are explained, and examples are provided of when more flexible validation schemes are required.
 +
 +
Lab: SQL Injection Patching
 +
The source code from the SQL Injection lab will be revisited and the vulnerabilities will be patched and tested.
 +
 +
Lab: Cross-Site Scripting Patching
 +
The source code from the Cross-Site Scripting lab will be revisited and the vulnerabilities will be patched and tested.
 +
 +
  Proper Encryption
 +
Initialization vectors, key generation and storage, cipher selection, and decryption oracles will all be discussed. Hashing and secure password storage will also be explained.
 +
 +
  Mini-Lab: Hash Breaking
 +
A set of insecurely generated password hashes will be provided to the students along with tools used for password attacks. Students will be shown how easy and fast it is to obtain plaintext passwords from insecure storage.
 +
 +
  Logic Flaws
 +
Application logic flaws can be devastating, but may take no special technical skills to exploit. Preventing them during the design and implementation phases will be discussed, as will techniques for finding logic flaws in existing applications.
 +
 +
  Lab: Logic Flaw Exploitation
 +
Students will be given access to several webpages with logic flaws on the class server.
 +
 +
Other Attacks
 +
This module explores additional vectors of attack such as Cross-Site Request Forgery, insecure redirects, HTTP response splitting, browser specific issues, and rich media security. Compound and other advanced attacks are also covered in this module.
 +
 +
Mini-Lab: XML Attacks
 +
Students will be given the opportunity to interact with several webpages that accept XML input. A number of XML attacks will be possible, including XML Injection, XML Bombs, and XML System Entity Expansion.
 +
 +
 +
 +
Security Hygiene
 +
Handling exceptional circumstances poorly can leak information about a system useful to an attacker, and in some cases be a source of compromise themselves. This module outlines a variety of concerns and best practices in the logging and communication of errors.
 +
 +
 +
 +
Final Lab: Hacking Contest
 +
All remaining time will be used for students to test their skills against an intentionally vulnerable web application. The student that discovers the most vulnerabilities will receive the grand prize!
 +
 +
 +
 +
Application Attack Detection & Response – A Hands-on Planning Workshop
 +
 +
 +
Trainer: Colin Watson (Watson Hall Ltd)
 +
 +
Audience Background: Either of Management, Technical, Operations
 +
 +
Skill Level Required: intermediate and/or advanced
 +
 +
Duration: 1 Day – July 10, 2012
 +
 +
Training Summary: A hands-on day-long workshop where participants will learn how to define, select and specify application-specific intrusion detection and protection (IDP). The training course uses a problem-centered approach where participants are encouraged to use their own knowledge and experience to apply the techniques learned in example paper-based lab projects. Most of the day will be spent working in small teams creating strategies and implementation plans, which could subsequently be used in development. The course does not involve any coding and is language/ framework agnostic. It is based on the concepts in the OWASP AppSensor Project. Full printed handouts are provided together with materials for all the exercises, so participants can take these away and apply the ideas within their own organizations. Previous delegates said “Good course content. Good exercises to work as a team.”, “Content was excellent. Can take this back to the office and apply immediately.” and “This course was worth the money”. Participants are encouraged to watch the following video presentation about AppSensor in advance of the training course: Automated Application Defenses to Thwart Advanced Attackers
 +
 +
 +
 +
Attendee takeaways and key learning objectives:On completion of the course, participants should be able to:
 +
 +
assess the business and user impacts of application IDP
 +
define application IDP strategies based on an assessment of risk
 +
create application IDP specifications
 +
The following printed materials will be given to each participant to take back to their place of work:
 +
 +
step-by-step planning guide
 +
course notes
 +
course exercises (notes and example solutions)
 +
Course Outline:
 +
 +
Course Introduction
 +
Preliminary Requirements
 +
Application Logging Practices
 +
Standard Detection Points
 +
Custom Detection Points
 +
Model Creation
 +
Model Optimization
 +
Attack Analysis
 +
Response Actions
 +
Response Threshold Specification
 +
Implementation Plan
 +
Optional Course Assessment Test Exercises will be undertaken in small teams of between 4 and 6 people. Each exercise during the day will be the continuation of the previous one, so the teams build up a complete IDP plan for their example project.
 +
 +
 +
 +
Elite Web Defense – How to build robust and secure web applications
 +
 +
Trainer Name:  Jim Manico and Eoin Keary (WhiteHat Security and  BCC Risk Advisory)
 +
Audience Background: Technical
 +
Audience Skill: Intermediate
 +
Duration: 1 Day – July 11, 2012 (cost 495 €)
 +
 +
 +
Training Summary:
 +
This highly interactive, intensive 1-day class provides essential web application security training for web application software developers and architects. The class is a combination of lecture, hands-on security testing and code review. Participants will not only learn the most common threats against web applications, but more importantly they will learn how to also fix the problems via control-based defensive code samples and review. Topics such as Authentication, Access Control, Crypto, Cross Site Request Forgery, Cross Site Scripting, Injection Defense, Clickjacking Defense, Session Management and other topics will be addressed from a defensive point-of-view.
  
  
 
=Presentations=
 
=Presentations=
For information on presentations please visit our  [http://www.appsecresearch.org/schedule/ site]  
+
For information on presentations please visit our  [http://2012.appsec.eu/schedule/ site]  
  
  
Line 204: Line 697:
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:30-10:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:30-10:00  
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);" | Welcome <br> OWASP Foundation, Where we are… Where we are Going <br> OWASP Board
+
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);" | [[https://www.owasp.org/images/6/6b/AppSecEU2012_Welcome.pdf Welcome]] <br> OWASP Foundation, Where we are… Where we are Going <br> OWASP Board
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:45  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:00-10:45  
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Software Security Goes Mobile <br>Jacob West, CTO, Fortify Products, HP
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Software Security Goes Mobile <br>Jacob West, CTO, Fortify Products, HP
 +
Video | [[https://www.owasp.org/images/0/0f/AppSecEU2012_SS_goes_mobile.pdf Slides]]
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 10:45-11:00  
Line 216: Line 710:
 
Justin Clarke<br>
 
Justin Clarke<br>
 
''(Gotham Digital Science)''
 
''(Gotham Digital Science)''
 +
Video | Slides
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | OWASP Top Ten Defensive Techniques<br>
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | OWASP Top Ten Defensive Techniques<br>
 
Jim Manico<br>
 
Jim Manico<br>
 
''(Whitehat)''
 
''(Whitehat)''
 
+
Video | [[https://www.owasp.org/images/3/3a/AppSecEU2012_Top_Ten_Defenses.pdf Slides]]
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |(P) Screw You and the Script You Rode in On<br>
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" |(P) Screw You and the Script You Rode in On<br>
 
David Byrne and Charles Henderson<br>
 
David Byrne and Charles Henderson<br>
 
''(Trustwave)''
 
''(Trustwave)''
 
+
Video | [[https://www.owasp.org/images/3/32/AppSecEU2012_WhatPermissionsDoesYourDatabaseUserREALLYNeed.pdf Slides]]
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:40-11:50  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 11:40-11:50  
Line 233: Line 728:
 
''Dave Wichers<br>
 
''Dave Wichers<br>
 
(Aspect Security)''
 
(Aspect Security)''
 
+
Video | [[https://www.owasp.org/images/3/30/AppSecEU2012_DOM-based_XSS.pdf Slides]]
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Breaking is easy, preventing is hard
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Breaking is easy, preventing is hard
 
''Matias Madou<br>
 
''Matias Madou<br>
 
(HP)''
 
(HP)''
 +
Video | [[https://www.owasp.org/images/2/2e/AppSecEU2012_BreakingIsEasyPreventingIsHardReWrite.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | What Permissions Does Your Database User REALLY Need?
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | What Permissions Does Your Database User REALLY Need?
 
''Dan Cornell<br>
 
''Dan Cornell<br>
 
(Denim Group)''
 
(Denim Group)''
 +
Video | [[https://www.owasp.org/images/3/32/AppSecEU2012_WhatPermissionsDoesYourDatabaseUserREALLYNeed.pdf Slides]]
  
 
|-
 
|-
Line 250: Line 747:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  From EasySQL to CPUs<br>
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  From EasySQL to CPUs<br>
 
''Duncan Harris, Director of Security Assurance, Oracle''
 
''Duncan Harris, Director of Security Assurance, Oracle''
 +
Video | [[https://www.owasp.org/images/1/15/AppSecEU2012_Oracle.pdf Slides]]
  
 
|-
 
|-
Line 259: Line 757:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Finding Malware on a Web Scale<br>
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Finding Malware on a Web Scale<br>
 
''Ben Livshits, Researcher, Microsoft Research''
 
''Ben Livshits, Researcher, Microsoft Research''
 +
Video | [[https://www.owasp.org/images/0/05/AppSecEU2012_Livshits.pdf Slides]]
 +
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:10-15:20  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 15:10-15:20  
Line 270: Line 770:
 
(Watson Hall)
 
(Watson Hall)
 
''
 
''
 +
Video | [[https://www.owasp.org/images/0/06/AppSecEU2012_Spaghetti.pdf Slides]]
 +
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | CISO’s Guide to Securing SharePoint
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | CISO’s Guide to Securing SharePoint
 
''Tsvika Klein<br>
 
''Tsvika Klein<br>
 
(Imperva)''
 
(Imperva)''
 +
Video | [[https://www.owasp.org/images/b/b1/AppSecEU2012_CISOs_Guide_to_Sharepoint.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) I>S+D! – Integrated Application Security Testing (IAST), Beyond SAST/DAST
 
''Ofer Maor<br>
 
''Ofer Maor<br>
 
(Seeker Security)''
 
(Seeker Security)''
 +
Video | [[Slides]]
  
 
|-
 
|-
Line 287: Line 791:
 
''Ashar Javed<br>
 
''Ashar Javed<br>
 
(Ruhr University Bochum)''
 
(Ruhr University Bochum)''
 +
Video | [[Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | Things Your Smartphone Does When Nobody’s Looking
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | Things Your Smartphone Does When Nobody’s Looking
 
''Chris Eng<br>
 
''Chris Eng<br>
 
(Veracode)''
 
(Veracode)''
 +
Video | [[https://www.owasp.org/images/c/cf/AppSecEU2012_Mobile_Risks.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) Achieving Sustainable Delivery of Web Application Security Virtual Laboratory Resources for Distance Learning
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) Achieving Sustainable Delivery of Web Application Security Virtual Laboratory Resources for Distance Learning
 
A''drian Winckles and Ibrahim Jeries<br>
 
A''drian Winckles and Ibrahim Jeries<br>
 
(Anglia Ruskin University)''
 
(Anglia Ruskin University)''
 +
Video | [[https://www.owasp.org/images/c/c4/AppSecEU2012_Winckles.pdf Slides]]
  
  
Line 301: Line 808:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Panel - PCI Security Standards and Application Security<br>
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Panel - PCI Security Standards and Application Security<br>
 
''Jeremy King (PCI Council)''
 
''Jeremy King (PCI Council)''
 +
Video | [[https://www.owasp.org/images/a/ad/AppSecEU2012_PCI.pdf Slides]]
 +
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 20:00  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 20:00  
Line 334: Line 843:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: A Decade of Software Security: From the Bug Parade to the BSIMM
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: A Decade of Software Security: From the Bug Parade to the BSIMM
 
''Gary McGraw, CTO, Cigital''
 
''Gary McGraw, CTO, Cigital''
 +
Video | [[https://www.owasp.org/images/e/eb/AppSecEU2012_zombies_decade_swsec12.pdf Slides]]
 +
 
|-
 
|-
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:55-10:05  
 
| style="width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | 09:55-10:05  
Line 344: Line 855:
 
''Kachhadiya Rakeshkumar and Benoist Emmanuel<br>
 
''Kachhadiya Rakeshkumar and Benoist Emmanuel<br>
 
(Albert Ludwigs Universität Freiburg and Berne University of Applied Sciences)''
 
(Albert Ludwigs Universität Freiburg and Berne University of Applied Sciences)''
 +
Video | [[https://www.owasp.org/images/e/e6/AppSecEU2012_Benoist.pdf Slides]]
 +
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Benchmarking Web Application Scanners for YOUR Organization
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Benchmarking Web Application Scanners for YOUR Organization
 
''Dan Cornell<br>
 
''Dan Cornell<br>
 
(Denim Group)''
 
(Denim Group)''
 +
Video | [[https://www.owasp.org/images/a/a8/AppSecEU2012_ScannerBenchmarking.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) The “cree.py” side of geolocation. Weaponizing your checkins
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) The “cree.py” side of geolocation. Weaponizing your checkins
 
''Ioannis Kakavas<br>
 
''Ioannis Kakavas<br>
 
(IT Advisor)''
 
(IT Advisor)''
 +
Video | [[https://www.owasp.org/images/8/82/AppSecEU2012_creepy.pdf Slides]]
  
  
Line 363: Line 878:
 
''Dinis Cruz<br>
 
''Dinis Cruz<br>
 
(Security Innovation)''
 
(Security Innovation)''
 +
Video | [[ Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Data Mining a Mountain of Zero Day Vulnerabilities
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Data Mining a Mountain of Zero Day Vulnerabilities
 
''Chris Eng<br>
 
''Chris Eng<br>
 
(Veracode)''
 
(Veracode)''
 +
Video | [[https://www.owasp.org/images/f/f5/AppSecEU2012_Data_Mining_Zero_Day.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) Anticipating Surprise – Fundamentals of Intelligence Gathering
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) Anticipating Surprise – Fundamentals of Intelligence Gathering
 
''Fred Donovan<br>
 
''Fred Donovan<br>
 
(Attack Logic)''
 
(Attack Logic)''
 
+
Video | [[https://www.owasp.org/images/7/7d/AppSecEU2012_Anticipating_Surprise.pdf Slides]]
  
 
|-
 
|-
Line 385: Line 902:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  Fatal Injection (and what you can do about it)
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote:  Fatal Injection (and what you can do about it)
 
''Diomidis Spinellis, Professor, Athens University of Economics and Business''
 
''Diomidis Spinellis, Professor, Athens University of Economics and Business''
 +
Video | [[Slides]]
  
 
|-
 
|-
Line 397: Line 915:
 
''Tony Ucedavelez<br>
 
''Tony Ucedavelez<br>
 
(VerSprite)''
 
(VerSprite)''
 +
Video | [[https://www.owasp.org/images/a/aa/AppSecEU2012_PASTA.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Can Correlations Secure Web Application?
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (P) Can Correlations Secure Web Application?
 
''Ofer Shezaf<br>
 
''Ofer Shezaf<br>
 
(HP)''  
 
(HP)''  
 +
Video | [[https://www.owasp.org/images/2/26/AppSecEU2012_Correlations.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) BDD for Automating Web Application Testing
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) BDD for Automating Web Application Testing
 
''Stephen De Vries<br>
 
''Stephen De Vries<br>
 
(Continuum Security)''
 
(Continuum Security)''
 
+
Video | [[Slides]]
  
 
|-
 
|-
Line 416: Line 936:
 
''Jerry Hoff<br>
 
''Jerry Hoff<br>
 
(Whitehat)''
 
(Whitehat)''
 +
Video | [[Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Using Hash-based Message Authentication Code Protocol to Reduce Web Application Attack Surface
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | (D) Using Hash-based Message Authentication Code Protocol to Reduce Web Application Attack Surface
 
''Breno Pinto and Luiz Eduardo Santos<br>
 
''Breno Pinto and Luiz Eduardo Santos<br>
 
(Trustwave)''
 
(Trustwave)''
 +
Video | [[Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) Advanced CSRF and Stateless Anti-CSRF
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (D) Advanced CSRF and Stateless Anti-CSRF
 
''John Wilander<br>
 
''John Wilander<br>
 
(Svenska Handelbanken and Linköpings universitet)''
 
(Svenska Handelbanken and Linköpings universitet)''
 
+
Video | [[https://www.owasp.org/images/e/e6/AppSecEU2012_Wilander.pdf Slides]]
  
 
|-
 
|-
Line 437: Line 959:
 
''Charles Henderson<br>
 
''Charles Henderson<br>
 
(Trustwave)''
 
(Trustwave)''
 +
Video | [[https://www.owasp.org/images/e/eb/AppSecEU2012_Anatomy_of_a_Logic_Flaw.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | 2012 Global Security Report
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(161, 161, 161);" | 2012 Global Security Report
 
''Tom Brennan<br>
 
''Tom Brennan<br>
 
(Trustwave)''
 
(Trustwave)''
 +
Video | [[https://www.owasp.org/images/a/ad/AppSecEU2012_PCI.pdf Slides]]
  
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) The Invisible Threat – MitB (Man in the Browser)
 
| align="center" style="width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);" | (P) The Invisible Threat – MitB (Man in the Browser)
 
''Uri Fleyder<br>
 
''Uri Fleyder<br>
 
(RSA Security)''
 
(RSA Security)''
 +
Video | [[https://www.owasp.org/images/1/1f/AppSecEU2012_MitB.pdf Slides]]
  
  
Line 455: Line 980:
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Jackpotting Mobile Apps
 
| align="center" colspan="3" style="width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);" | Keynote: Jackpotting Mobile Apps
 
Christian Papathanasiou
 
Christian Papathanasiou
 +
Video | [[https://www.owasp.org/images/f/f6/AppSecEU2012_Jackpotting.pdf Slides]]
  
 
|-
 
|-
Line 1,037: Line 1,563:
  
 
Christian holds a MSc with Distinction in Information Security from the Information Security Group at Royal Holloway, University of London and a CISSP. Christian is also a qualified Chemical Engineer having graduated with a MEng(Hons) in Chemical Engineering from UMIST.
 
Christian holds a MSc with Distinction in Information Security from the Information Security Group at Royal Holloway, University of London and a CISSP. Christian is also a qualified Chemical Engineer having graduated with a MEng(Hons) in Chemical Engineering from UMIST.
 +
 +
 +
=Uni Challenge=
 +
 +
 +
Uni Challenge
 +
 +
OWASP AppSec Research 2012 announces the OWASP University Challenge! The University Challenge is a competition among teams comprised of university students that will be held on July 10-11th. During the University Challenge teams will defend a vulnerable web application while solving Capture The Flag type challenges.
 +
 +
This year the OWASP University Challenge will be limited to 8 teams. Teams will consist of 4-8 students, with one team per University.  Team openings are on a first come first serve basis. If multiple teams are received from the same university the second team will be put on a wait list.
 +
 +
All team members must be registered. Registration for the University Challenge event is free. Food and beverages will be provided during the challenge and all participants will get an OWASP University Challenge t-shirt. In addition, all participants that will register for the conference will get an additional discount on top of the discounted student price (an e-mail with the discount coupon will be automatically e-mailed ). Of course, the first three winning teams will get some awesome presents (to be announced).
 +
 +
To sign up: Please send an e-mail to appseceu@owasp.org using “University Challenge” as a subject and including the following information:
 +
 +
Name of Team
 +
University
 +
Professor name (and e-mail)
 +
Team Leader (and e-mail)
 +
Team Members (and e-mails)
 +
Each team member will need:
 +
 +
Your own notebook capable of running the following:
 +
BackTrack (CD-Rom or USB stick version – Download BackTrack)
 +
VMWare Player (Download VMWare Player)
 +
VirtualBox Player
 +
FTP Client (Download Filezilla)
 +
SSH Client (Download Putty)
 +
Wireshark (Download Wireshark)
 +
Nmap (Download Nmap)
 +
Firefox (Download Firefox)
 +
Firefox Add-ons: FoxyProxy, Cookie Editor, HackBar, Web Developper Toolbar, QuickJava, Tamper Data, Live HTTP Headers
 +
AndiParos Proxy (Download AndiParos Proxy)
 +
Hexeditor
 +
Cryptool (Download Cryptool)
 +
Your own testing tools
  
  
Line 1,087: Line 1,649:
  
 
===Contributions===
 
===Contributions===
The [http://www.appsecresearch.org AppSec Research Conference Website's] artwork was made by [mailto:8aleia.mariaATgmail.com Mis Thaleia V.]
+
The [http://2012.appsec.eu AppSec Research Conference Website's] artwork was made by [mailto:8aleia.mariaATgmail.com Mis Thaleia V.]
 
Mis Marianna Preen is the person who designed the icons
 
Mis Marianna Preen is the person who designed the icons
  
Line 1,094: Line 1,656:
  
 
You Can download the[[Media:Appsecschedule2012grfinal.pdf]]
 
You Can download the[[Media:Appsecschedule2012grfinal.pdf]]
or view it online on our site here: [http://www.appsecresearch.org/schedule/]
+
or view it online on our site here: [http://2012.appsec.eu/schedule/]
 +
 
 +
=Recruitment Event=
 +
 
 +
Recruiting Event
 +
 
 +
Want to work with the brightest minds in software security?
 +
 
 +
Cigital is hiring at OWASP AppSec Research!
 +
 
 +
 
 +
 
 +
Who: Look for Julian Osei, Director of Talent Acquisition EMEA.
 +
 
 +
When: During lunch breaks on the 12th and the 13th and during the Conference Cocktail.
 +
 
 +
Where: There will be a dedicated room, so look for the Cigital logo.
 +
 
 +
If you would like your CV to be pre-screened by Julian and his team, send us a copy at: appseceu+cv@owasp.org
 +
 
 +
The challenges we offer are intellectually stimulating and you’ll be working side by side with some of the brightest minds in the industry. Our tremendous growth over the last few years is set to continue, and that means you can anticipate career advancement at the same electric pace. We’re looking for skilled and driven security consultants at all levels. We need entry-level, mid-level, and senior consultants – as well as more senior expertise.
 +
 
 +
Security Consultants
 +
 
 +
Come and pick up the tricks of the trade in application security from the people who do it best. You’ll learn the most effective ways to do penetration testing, static analysis and risk assessments, and you’ll learn fast. If you’ve got a solid background in modern development languages and you are thirsty for knowledge when it comes to app security, tell us! Relevant degrees, coursework, professional experience and dabbling in the field are what we want – what did you discover today?
 +
 
 +
Senior Security Consultants
 +
 
 +
For people more experienced in the field of application security who’ve built trusted advisory relationships with clients – we’d love to bring you on board, too. If you like brain-twisting challenges and travelling to exciting places, Cigital is where you want to be. We help our clients through some tricky situations, so your software security skills and problem-solving expertise are invaluable here. If you’re passionate – let’s talk!
 +
 
 +
Managing Consultants
 +
 
 +
Have charisma? You’ll need it to help expand our company into new areas and even greater market penetration. In this role, you’ll lead a region – this takes technical savvy and solid business development skills. If you care about clients and know how to manage people; if you can grow a team and attract new talent then this is the role for you – what’s your vision? Come and tell us.
  
 
=Social Events=
 
=Social Events=
Line 1,100: Line 1,694:
 
Cocktail Party at the main auditorium of the university  
 
Cocktail Party at the main auditorium of the university  
 
and the OWASP band performance
 
and the OWASP band performance
you can find more: http://www.appsecresearch.org/social-events/
+
you can find more: http://2012.appsec.eu/social-events/
 
<headertabs />
 
<headertabs />
 +
 +
Social Events
 +
 +
During OWASP AppSec Research we are organizing a variety of social events:
 +
 +
 +
 +
Tuesday July 10nth at 20:30 – Welcome drinks at Cafe Avissinia
 +
 +
 +
 +
OWASP Appsec Research team will be at Cafe Avissinia and would like to invite all trainers, trainees, uni challenge participants and anyuone else who happens to be in Athens to join us. Drinks at Cafe Avissinia have reasonable prices, the food is amazingly good and the view to the Acropolis magnificent.
 +
Cafe Avissinia is located at Avissinias Square near the Monastiraki Metro Station. For map and instructions please see here.
 +
 +
Wednesday, July 11th at 20:30 – OWASP Band Performance
 +
 +
 +
 +
No explanation required, the OWASP band feat. Gary McGraw will give a rare, outstanding performance as usual on the evening of Wednesday, July 11th at Ya cafe (for map and instructions please see at the end of this page).
 +
 +
For map and instructions please see here
 +
 +
Opening Act: The Weather Underground
 +
 +
 +
 +
 +
 +
 +
 +
Thursday, July 12th at 20:00 – Conference Cocktail
 +
 +
All conference attendees, sponsors and volunteers are invited to the Conference Cocktail at the “Kostis Palamas” building on Thursday, July 12th. The cocktail will start at 8pm.
 +
 +
The “Kostis Palamas” building was built at 1857 and at the time it hosted the university’s medical and physics labs. Nowadays, it has been renovated and it is used as a cultural center and a meeting point for the university community. It is one of the historical buildings of Athens, with characteristic architecture, design and decorations.
 +
 +
       
 +
 +
“Kostis Palamas” is located at 48 Academias str. and the nearest metro station is Panepistimio. To get there from Evangelismos station, you pick the line that goes towards Egaleo. You get off the next stop (Syntagma) and head to the red line platform that goes towards Aghios Antonios. You get off at the next stop, Panepistimio. Use the exit labeled as “Panepistimiou Str (Athens Academy)” to get of the station. Once you exit, head to your left, walking in between of the imposing buildings. Cross the first street you find (Academias str.) and you can find the Kostis Palamas building on your right.
 +
 +
Alternatively, at that time of the day, a taxi should need approximately 10′ to get from Divani Caravel to the Kostis Palamas building. Giving the taxi driver the exact address (48 Academias str.) is more than enough.
 +
 +
The music is provided by the student e-radio station:

Latest revision as of 07:03, 24 September 2013


AppsecResearch2012Banner.jpg

We are happy to announce that the OWASP Greek Chapter will be hosting the AppSec Research 2012 in Athens Greece

This conference is practically the OWASP AppSec Europe. Every two years we add “Research” in order to highlight that we invite both industry and academia to participate, share thoughts, knowledge and insight on application security.

OWASP AppSec Research is the European conference for anyone interested in application security

This year it will be hosted by the Department of Informatics and Telecommunications of the University of Athens, Greece and will take place between July 10-13th.

The first OWASP AppSec Research conference was held in Stockholm in 2010.


AppSec Research 2012 Conference Website



@appseceu Twitter Feed (follow us on Twitter!) <twitter>228539824</twitter>


Social Events

During OWASP AppSec Research we are organizing a variety of social events:


Tuesday July 10nth at 20:30 – Welcome drinks at Cafe Avissinia


OWASP Appsec Research team will be at Cafe Avissinia and would like to invite all trainers, trainees, uni challenge participants and anyuone else who happens to be in Athens to join us. Drinks at Cafe Avissinia have reasonable prices, the food is amazingly good and the view to the Acropolis magnificent. Cafe Avissinia is located at Avissinias Square near the Monastiraki Metro Station. For map and instructions please see here.

Wednesday, July 11th at 20:30 – OWASP Band Performance


No explanation required, the OWASP band feat. Gary McGraw will give a rare, outstanding performance as usual on the evening of Wednesday, July 11th at Ya cafe (for map and instructions please see at the end of this page).

For map and instructions please see here

Opening Act: The Weather Underground




Thursday, July 12th at 20:00 – Conference Cocktail

All conference attendees, sponsors and volunteers are invited to the Conference Cocktail at the “Kostis Palamas” building on Thursday, July 12th. The cocktail will start at 8pm.

The “Kostis Palamas” building was built at 1857 and at the time it hosted the university’s medical and physics labs. Nowadays, it has been renovated and it is used as a cultural center and a meeting point for the university community. It is one of the historical buildings of Athens, with characteristic architecture, design and decorations.


“Kostis Palamas” is located at 48 Academias str. and the nearest metro station is Panepistimio. To get there from Evangelismos station, you pick the line that goes towards Egaleo. You get off the next stop (Syntagma) and head to the red line platform that goes towards Aghios Antonios. You get off at the next stop, Panepistimio. Use the exit labeled as “Panepistimiou Str (Athens Academy)” to get of the station. Once you exit, head to your left, walking in between of the imposing buildings. Cross the first street you find (Academias str.) and you can find the Kostis Palamas building on your right.

Alternatively, at that time of the day, a taxi should need approximately 10′ to get from Divani Caravel to the Kostis Palamas building. Giving the taxi driver the exact address (48 Academias str.) is more than enough.

The music is provided by the student e-radio station: